Feb 9 20:04:01.549579 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 20:04:01.549591 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 20:04:01.549599 kernel: BIOS-provided physical RAM map: Feb 9 20:04:01.549602 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 20:04:01.549606 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 20:04:01.549610 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 20:04:01.549614 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 20:04:01.549618 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 20:04:01.549621 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000082589fff] usable Feb 9 20:04:01.549625 kernel: BIOS-e820: [mem 0x000000008258a000-0x000000008258afff] ACPI NVS Feb 9 20:04:01.549630 kernel: BIOS-e820: [mem 0x000000008258b000-0x000000008258bfff] reserved Feb 9 20:04:01.549634 kernel: BIOS-e820: [mem 0x000000008258c000-0x000000008afccfff] usable Feb 9 20:04:01.549637 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 9 20:04:01.549641 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 9 20:04:01.549646 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 9 20:04:01.549651 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 9 20:04:01.549655 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 9 20:04:01.549659 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 9 20:04:01.549663 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 20:04:01.549667 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 20:04:01.549671 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 20:04:01.549675 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 20:04:01.549679 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 20:04:01.549683 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 9 20:04:01.549687 kernel: NX (Execute Disable) protection: active Feb 9 20:04:01.549691 kernel: SMBIOS 3.2.1 present. Feb 9 20:04:01.549696 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Feb 9 20:04:01.549700 kernel: tsc: Detected 3400.000 MHz processor Feb 9 20:04:01.549704 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 20:04:01.549709 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 20:04:01.549713 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 20:04:01.549717 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 9 20:04:01.549722 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 20:04:01.549726 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 9 20:04:01.549730 kernel: Using GB pages for direct mapping Feb 9 20:04:01.549734 kernel: ACPI: Early table checksum verification disabled Feb 9 20:04:01.549739 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 20:04:01.549743 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 20:04:01.549748 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 9 20:04:01.549752 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 20:04:01.549758 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 9 20:04:01.549763 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 9 20:04:01.549768 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 9 20:04:01.549772 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 20:04:01.549777 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 20:04:01.549781 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 20:04:01.549786 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 20:04:01.549791 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 20:04:01.549795 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 20:04:01.549800 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 20:04:01.549805 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 20:04:01.549809 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 20:04:01.549814 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 20:04:01.549819 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 20:04:01.549823 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 20:04:01.549827 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 20:04:01.549832 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 20:04:01.549836 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 20:04:01.549842 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 20:04:01.549846 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 9 20:04:01.549851 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 20:04:01.549855 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 20:04:01.549860 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 20:04:01.549864 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 9 20:04:01.549869 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 20:04:01.549873 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 20:04:01.549878 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 20:04:01.549883 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 20:04:01.549888 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 20:04:01.549892 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 9 20:04:01.549897 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 9 20:04:01.549901 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 9 20:04:01.549906 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 9 20:04:01.549910 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 9 20:04:01.549915 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 9 20:04:01.549920 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 9 20:04:01.549925 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 9 20:04:01.549929 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 9 20:04:01.549934 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 9 20:04:01.549938 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 9 20:04:01.549942 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 9 20:04:01.549947 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 9 20:04:01.549951 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 9 20:04:01.549956 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 9 20:04:01.549961 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 9 20:04:01.549966 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 9 20:04:01.549970 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 9 20:04:01.549975 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 9 20:04:01.549979 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 9 20:04:01.549984 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 9 20:04:01.549988 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 9 20:04:01.549993 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 9 20:04:01.549997 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 9 20:04:01.550002 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 9 20:04:01.550007 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 9 20:04:01.550011 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 9 20:04:01.550016 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 9 20:04:01.550020 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 9 20:04:01.550025 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 9 20:04:01.550029 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 9 20:04:01.550034 kernel: No NUMA configuration found Feb 9 20:04:01.550038 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 9 20:04:01.550044 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 9 20:04:01.550048 kernel: Zone ranges: Feb 9 20:04:01.550053 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 20:04:01.550057 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 20:04:01.550062 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 9 20:04:01.550066 kernel: Movable zone start for each node Feb 9 20:04:01.550071 kernel: Early memory node ranges Feb 9 20:04:01.550075 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 20:04:01.550080 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 20:04:01.550084 kernel: node 0: [mem 0x0000000040400000-0x0000000082589fff] Feb 9 20:04:01.550090 kernel: node 0: [mem 0x000000008258c000-0x000000008afccfff] Feb 9 20:04:01.550094 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 9 20:04:01.550099 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 9 20:04:01.550103 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 9 20:04:01.550108 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 9 20:04:01.550112 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 20:04:01.550120 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 20:04:01.550126 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 20:04:01.550131 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 20:04:01.550136 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 9 20:04:01.550141 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 9 20:04:01.550146 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 9 20:04:01.550151 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 9 20:04:01.550156 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 20:04:01.550161 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 20:04:01.550166 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 20:04:01.550170 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 20:04:01.550176 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 20:04:01.550181 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 20:04:01.550186 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 20:04:01.550190 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 20:04:01.550195 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 20:04:01.550200 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 20:04:01.550205 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 20:04:01.550210 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 20:04:01.550215 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 20:04:01.550222 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 20:04:01.550243 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 20:04:01.550248 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 20:04:01.550253 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 20:04:01.550258 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 20:04:01.550279 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 20:04:01.550284 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 20:04:01.550289 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 20:04:01.550293 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 20:04:01.550299 kernel: TSC deadline timer available Feb 9 20:04:01.550304 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 20:04:01.550309 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 9 20:04:01.550314 kernel: Booting paravirtualized kernel on bare hardware Feb 9 20:04:01.550319 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 20:04:01.550324 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 20:04:01.550328 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 20:04:01.550333 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 20:04:01.550338 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 20:04:01.550343 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 9 20:04:01.550348 kernel: Policy zone: Normal Feb 9 20:04:01.550354 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 20:04:01.550359 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 20:04:01.550364 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 20:04:01.550369 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 20:04:01.550374 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 20:04:01.550379 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 9 20:04:01.550385 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 20:04:01.550389 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 20:04:01.550394 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 20:04:01.550399 kernel: rcu: Hierarchical RCU implementation. Feb 9 20:04:01.550404 kernel: rcu: RCU event tracing is enabled. Feb 9 20:04:01.550409 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 20:04:01.550414 kernel: Rude variant of Tasks RCU enabled. Feb 9 20:04:01.550419 kernel: Tracing variant of Tasks RCU enabled. Feb 9 20:04:01.550425 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 20:04:01.550430 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 20:04:01.550435 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 20:04:01.550439 kernel: random: crng init done Feb 9 20:04:01.550444 kernel: Console: colour dummy device 80x25 Feb 9 20:04:01.550449 kernel: printk: console [tty0] enabled Feb 9 20:04:01.550454 kernel: printk: console [ttyS1] enabled Feb 9 20:04:01.550459 kernel: ACPI: Core revision 20210730 Feb 9 20:04:01.550464 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 9 20:04:01.550469 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 20:04:01.550475 kernel: DMAR: Host address width 39 Feb 9 20:04:01.550479 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 20:04:01.550484 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 20:04:01.550489 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 9 20:04:01.550494 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 9 20:04:01.550499 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 20:04:01.550504 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 20:04:01.550509 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 20:04:01.550513 kernel: x2apic enabled Feb 9 20:04:01.550519 kernel: Switched APIC routing to cluster x2apic. Feb 9 20:04:01.550524 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 20:04:01.550529 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 20:04:01.550534 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 20:04:01.550539 kernel: process: using mwait in idle threads Feb 9 20:04:01.550544 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 20:04:01.550548 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 20:04:01.550553 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 20:04:01.550558 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 20:04:01.550564 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 20:04:01.550568 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 20:04:01.550573 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 20:04:01.550578 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 20:04:01.550583 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 20:04:01.550587 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 20:04:01.550592 kernel: TAA: Mitigation: TSX disabled Feb 9 20:04:01.550597 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 20:04:01.550602 kernel: SRBDS: Mitigation: Microcode Feb 9 20:04:01.550607 kernel: GDS: Vulnerable: No microcode Feb 9 20:04:01.550612 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 20:04:01.550617 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 20:04:01.550622 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 20:04:01.550627 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 20:04:01.550632 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 20:04:01.550636 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 20:04:01.550641 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 20:04:01.550646 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 20:04:01.550651 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 20:04:01.550655 kernel: Freeing SMP alternatives memory: 32K Feb 9 20:04:01.550660 kernel: pid_max: default: 32768 minimum: 301 Feb 9 20:04:01.550665 kernel: LSM: Security Framework initializing Feb 9 20:04:01.550670 kernel: SELinux: Initializing. Feb 9 20:04:01.550676 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 20:04:01.550680 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 20:04:01.550685 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 20:04:01.550690 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 20:04:01.550695 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 20:04:01.550700 kernel: ... version: 4 Feb 9 20:04:01.550705 kernel: ... bit width: 48 Feb 9 20:04:01.550710 kernel: ... generic registers: 4 Feb 9 20:04:01.550714 kernel: ... value mask: 0000ffffffffffff Feb 9 20:04:01.550719 kernel: ... max period: 00007fffffffffff Feb 9 20:04:01.550725 kernel: ... fixed-purpose events: 3 Feb 9 20:04:01.550730 kernel: ... event mask: 000000070000000f Feb 9 20:04:01.550735 kernel: signal: max sigframe size: 2032 Feb 9 20:04:01.550739 kernel: rcu: Hierarchical SRCU implementation. Feb 9 20:04:01.550744 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 20:04:01.550749 kernel: smp: Bringing up secondary CPUs ... Feb 9 20:04:01.550754 kernel: x86: Booting SMP configuration: Feb 9 20:04:01.550759 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 20:04:01.550764 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 20:04:01.550769 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 20:04:01.550774 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 20:04:01.550779 kernel: smpboot: Max logical packages: 1 Feb 9 20:04:01.550784 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 20:04:01.550789 kernel: devtmpfs: initialized Feb 9 20:04:01.550794 kernel: x86/mm: Memory block size: 128MB Feb 9 20:04:01.550798 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8258a000-0x8258afff] (4096 bytes) Feb 9 20:04:01.550803 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 9 20:04:01.550809 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 20:04:01.550814 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 20:04:01.550819 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 20:04:01.550824 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 20:04:01.550828 kernel: audit: initializing netlink subsys (disabled) Feb 9 20:04:01.550833 kernel: audit: type=2000 audit(1707509036.040:1): state=initialized audit_enabled=0 res=1 Feb 9 20:04:01.550838 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 20:04:01.550843 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 20:04:01.550848 kernel: cpuidle: using governor menu Feb 9 20:04:01.550853 kernel: ACPI: bus type PCI registered Feb 9 20:04:01.550858 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 20:04:01.550863 kernel: dca service started, version 1.12.1 Feb 9 20:04:01.550868 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 20:04:01.550873 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 20:04:01.550877 kernel: PCI: Using configuration type 1 for base access Feb 9 20:04:01.550882 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 20:04:01.550887 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 20:04:01.550892 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 20:04:01.550898 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 20:04:01.550902 kernel: ACPI: Added _OSI(Module Device) Feb 9 20:04:01.550907 kernel: ACPI: Added _OSI(Processor Device) Feb 9 20:04:01.550912 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 20:04:01.550917 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 20:04:01.550922 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 20:04:01.550927 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 20:04:01.550931 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 20:04:01.550936 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 20:04:01.550942 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:04:01.550947 kernel: ACPI: SSDT 0xFFFF936841352900 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 20:04:01.550952 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 20:04:01.550957 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:04:01.550961 kernel: ACPI: SSDT 0xFFFF936841348C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 20:04:01.550966 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:04:01.550971 kernel: ACPI: SSDT 0xFFFF936841B98000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 20:04:01.550976 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:04:01.550980 kernel: ACPI: SSDT 0xFFFF936841B9E000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 20:04:01.550985 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:04:01.550991 kernel: ACPI: SSDT 0xFFFF936841344000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 20:04:01.550996 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:04:01.551000 kernel: ACPI: SSDT 0xFFFF936841348800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 20:04:01.551005 kernel: ACPI: Interpreter enabled Feb 9 20:04:01.551010 kernel: ACPI: PM: (supports S0 S5) Feb 9 20:04:01.551015 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 20:04:01.551020 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 20:04:01.551025 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 20:04:01.551029 kernel: HEST: Table parsing has been initialized. Feb 9 20:04:01.551035 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 20:04:01.551040 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 20:04:01.551045 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 20:04:01.551050 kernel: ACPI: PM: Power Resource [USBC] Feb 9 20:04:01.551054 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 20:04:01.551059 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 20:04:01.551064 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 20:04:01.551069 kernel: ACPI: PM: Power Resource [WRST] Feb 9 20:04:01.551074 kernel: ACPI: PM: Power Resource [FN00] Feb 9 20:04:01.551079 kernel: ACPI: PM: Power Resource [FN01] Feb 9 20:04:01.551084 kernel: ACPI: PM: Power Resource [FN02] Feb 9 20:04:01.551089 kernel: ACPI: PM: Power Resource [FN03] Feb 9 20:04:01.551093 kernel: ACPI: PM: Power Resource [FN04] Feb 9 20:04:01.551098 kernel: ACPI: PM: Power Resource [PIN] Feb 9 20:04:01.551103 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 20:04:01.551166 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 20:04:01.551210 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 20:04:01.551271 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 20:04:01.551278 kernel: PCI host bridge to bus 0000:00 Feb 9 20:04:01.551324 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 20:04:01.551362 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 20:04:01.551398 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 20:04:01.551434 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 9 20:04:01.551470 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 20:04:01.551507 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 20:04:01.551558 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 20:04:01.551606 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 20:04:01.551650 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 20:04:01.551695 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 20:04:01.551738 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 9 20:04:01.551785 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 20:04:01.551828 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 9 20:04:01.551874 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 20:04:01.551916 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 9 20:04:01.551961 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 20:04:01.552006 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 20:04:01.552050 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 9 20:04:01.552091 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 9 20:04:01.552136 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 20:04:01.552179 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 20:04:01.552225 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 20:04:01.552269 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 20:04:01.552316 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 20:04:01.552358 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 9 20:04:01.552400 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 20:04:01.552443 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 20:04:01.552486 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 9 20:04:01.552527 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 20:04:01.552574 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 20:04:01.552617 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 9 20:04:01.552658 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 20:04:01.552702 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 20:04:01.552743 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 9 20:04:01.552784 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 9 20:04:01.552824 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 9 20:04:01.552865 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 9 20:04:01.552912 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 9 20:04:01.552955 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 9 20:04:01.552997 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 20:04:01.553043 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 20:04:01.553086 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 20:04:01.553132 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 20:04:01.553175 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 20:04:01.553225 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 20:04:01.553269 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 20:04:01.553315 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 20:04:01.553357 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 20:04:01.553405 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 9 20:04:01.553451 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 9 20:04:01.553511 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 20:04:01.553552 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 20:04:01.553598 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 20:04:01.553646 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 20:04:01.553688 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 9 20:04:01.553728 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 20:04:01.553773 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 20:04:01.553814 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 20:04:01.553860 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 20:04:01.553905 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 20:04:01.553946 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 9 20:04:01.553989 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 9 20:04:01.554031 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 20:04:01.554073 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 20:04:01.554121 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 20:04:01.554165 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 20:04:01.554208 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 9 20:04:01.554276 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 9 20:04:01.554336 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 20:04:01.554378 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 20:04:01.554419 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 20:04:01.554461 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 20:04:01.554501 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 20:04:01.554541 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 20:04:01.554590 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 9 20:04:01.554632 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 9 20:04:01.554676 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 20:04:01.554720 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 9 20:04:01.554764 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 9 20:04:01.554807 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 20:04:01.554849 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 20:04:01.554892 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 20:04:01.554971 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 20:04:01.555034 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 9 20:04:01.555076 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 20:04:01.555119 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 9 20:04:01.555160 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 20:04:01.555202 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 20:04:01.555269 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 20:04:01.555333 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 20:04:01.555375 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 20:04:01.555422 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 20:04:01.555464 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 9 20:04:01.555507 kernel: pci 0000:06:00.0: supports D1 D2 Feb 9 20:04:01.555551 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 20:04:01.555592 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 20:04:01.555633 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 20:04:01.555676 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 20:04:01.555721 kernel: pci_bus 0000:07: extended config space not accessible Feb 9 20:04:01.555769 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 20:04:01.555814 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 9 20:04:01.555859 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 9 20:04:01.555904 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 20:04:01.555948 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 20:04:01.555994 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 20:04:01.556038 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 20:04:01.556081 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 20:04:01.556123 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 20:04:01.556167 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 20:04:01.556174 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 20:04:01.556180 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 20:04:01.556186 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 20:04:01.556192 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 20:04:01.556197 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 20:04:01.556202 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 20:04:01.556207 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 20:04:01.556212 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 20:04:01.556218 kernel: iommu: Default domain type: Translated Feb 9 20:04:01.556247 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 20:04:01.556291 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 9 20:04:01.556356 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 20:04:01.556400 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 9 20:04:01.556408 kernel: vgaarb: loaded Feb 9 20:04:01.556413 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 20:04:01.556418 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 20:04:01.556423 kernel: PTP clock support registered Feb 9 20:04:01.556429 kernel: PCI: Using ACPI for IRQ routing Feb 9 20:04:01.556434 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 20:04:01.556439 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 20:04:01.556445 kernel: e820: reserve RAM buffer [mem 0x8258a000-0x83ffffff] Feb 9 20:04:01.556450 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 9 20:04:01.556456 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 9 20:04:01.556461 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 9 20:04:01.556466 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 9 20:04:01.556471 kernel: clocksource: Switched to clocksource tsc-early Feb 9 20:04:01.556476 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 20:04:01.556481 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 20:04:01.556486 kernel: pnp: PnP ACPI init Feb 9 20:04:01.556532 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 20:04:01.556573 kernel: pnp 00:02: [dma 0 disabled] Feb 9 20:04:01.556614 kernel: pnp 00:03: [dma 0 disabled] Feb 9 20:04:01.556653 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 20:04:01.556691 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 20:04:01.556731 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 20:04:01.556774 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 20:04:01.556812 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 20:04:01.556848 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 20:04:01.556885 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 20:04:01.556922 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 20:04:01.556958 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 20:04:01.556995 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 20:04:01.557033 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 20:04:01.557075 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 20:04:01.557112 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 20:04:01.557150 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 20:04:01.557186 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 20:04:01.557242 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 20:04:01.557296 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 20:04:01.557334 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 20:04:01.557375 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 20:04:01.557383 kernel: pnp: PnP ACPI: found 10 devices Feb 9 20:04:01.557388 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 20:04:01.557393 kernel: NET: Registered PF_INET protocol family Feb 9 20:04:01.557398 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 20:04:01.557404 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 20:04:01.557410 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 20:04:01.557416 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 20:04:01.557421 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 20:04:01.557426 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 20:04:01.557432 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 20:04:01.557437 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 20:04:01.557442 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 20:04:01.557447 kernel: NET: Registered PF_XDP protocol family Feb 9 20:04:01.557488 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 9 20:04:01.557532 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 9 20:04:01.557573 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 9 20:04:01.557616 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 20:04:01.557658 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 20:04:01.557701 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 20:04:01.557742 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 20:04:01.557782 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 20:04:01.557825 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 20:04:01.557867 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 20:04:01.557909 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 20:04:01.557949 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 20:04:01.557991 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 20:04:01.558031 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 20:04:01.558075 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 20:04:01.558115 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 20:04:01.558156 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 20:04:01.558198 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 20:04:01.558268 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 20:04:01.558325 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 20:04:01.558367 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 20:04:01.558409 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 20:04:01.558451 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 20:04:01.558493 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 20:04:01.558529 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 20:04:01.558565 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 20:04:01.558601 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 20:04:01.558636 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 20:04:01.558672 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 9 20:04:01.558707 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 20:04:01.558750 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 9 20:04:01.558791 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 20:04:01.558833 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 9 20:04:01.558872 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 9 20:04:01.558912 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 9 20:04:01.558950 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 9 20:04:01.558993 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 9 20:04:01.559034 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 9 20:04:01.559073 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 20:04:01.559114 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 9 20:04:01.559121 kernel: PCI: CLS 64 bytes, default 64 Feb 9 20:04:01.559127 kernel: DMAR: No ATSR found Feb 9 20:04:01.559132 kernel: DMAR: No SATC found Feb 9 20:04:01.559137 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 20:04:01.559180 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 20:04:01.559225 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 20:04:01.559307 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 9 20:04:01.559348 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 9 20:04:01.559390 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 9 20:04:01.559431 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 9 20:04:01.559472 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 9 20:04:01.559512 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 9 20:04:01.559554 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 9 20:04:01.559596 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 9 20:04:01.559636 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 9 20:04:01.559677 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 9 20:04:01.559718 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 9 20:04:01.559758 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 9 20:04:01.559799 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 9 20:04:01.559840 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 9 20:04:01.559881 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 9 20:04:01.559923 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 9 20:04:01.559965 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 9 20:04:01.560006 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 9 20:04:01.560047 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 9 20:04:01.560089 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 9 20:04:01.560132 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 9 20:04:01.560175 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 9 20:04:01.560218 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 20:04:01.560309 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 9 20:04:01.560354 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 9 20:04:01.560361 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 20:04:01.560367 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 20:04:01.560372 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 9 20:04:01.560378 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 9 20:04:01.560383 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 20:04:01.560388 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 20:04:01.560395 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 20:04:01.560439 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 20:04:01.560447 kernel: Initialise system trusted keyrings Feb 9 20:04:01.560453 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 20:04:01.560458 kernel: Key type asymmetric registered Feb 9 20:04:01.560463 kernel: Asymmetric key parser 'x509' registered Feb 9 20:04:01.560468 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 20:04:01.560473 kernel: io scheduler mq-deadline registered Feb 9 20:04:01.560480 kernel: io scheduler kyber registered Feb 9 20:04:01.560485 kernel: io scheduler bfq registered Feb 9 20:04:01.560525 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 9 20:04:01.560567 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 9 20:04:01.560608 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 9 20:04:01.560649 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 9 20:04:01.560690 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 9 20:04:01.560731 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 9 20:04:01.560779 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 20:04:01.560787 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 20:04:01.560793 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 20:04:01.560798 kernel: pstore: Registered erst as persistent store backend Feb 9 20:04:01.560804 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 20:04:01.560809 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 20:04:01.560814 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 20:04:01.560819 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 20:04:01.560826 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 9 20:04:01.560866 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 20:04:01.560874 kernel: i8042: PNP: No PS/2 controller found. Feb 9 20:04:01.560911 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 20:04:01.560949 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 20:04:01.560987 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T20:04:00 UTC (1707509040) Feb 9 20:04:01.561024 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 20:04:01.561031 kernel: fail to initialize ptp_kvm Feb 9 20:04:01.561038 kernel: intel_pstate: Intel P-state driver initializing Feb 9 20:04:01.561043 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 20:04:01.561049 kernel: intel_pstate: HWP enabled Feb 9 20:04:01.561054 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 20:04:01.561059 kernel: vesafb: scrolling: redraw Feb 9 20:04:01.561064 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 20:04:01.561069 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000bfe78a1a, using 768k, total 768k Feb 9 20:04:01.561075 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 20:04:01.561080 kernel: fb0: VESA VGA frame buffer device Feb 9 20:04:01.561086 kernel: NET: Registered PF_INET6 protocol family Feb 9 20:04:01.561091 kernel: Segment Routing with IPv6 Feb 9 20:04:01.561096 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 20:04:01.561102 kernel: NET: Registered PF_PACKET protocol family Feb 9 20:04:01.561107 kernel: Key type dns_resolver registered Feb 9 20:04:01.561112 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 20:04:01.561117 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 20:04:01.561122 kernel: IPI shorthand broadcast: enabled Feb 9 20:04:01.561127 kernel: sched_clock: Marking stable (2074988028, 1339651544)->(4437421920, -1022782348) Feb 9 20:04:01.561133 kernel: registered taskstats version 1 Feb 9 20:04:01.561139 kernel: Loading compiled-in X.509 certificates Feb 9 20:04:01.561144 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 20:04:01.561149 kernel: Key type .fscrypt registered Feb 9 20:04:01.561154 kernel: Key type fscrypt-provisioning registered Feb 9 20:04:01.561159 kernel: pstore: Using crash dump compression: deflate Feb 9 20:04:01.561164 kernel: ima: Allocated hash algorithm: sha1 Feb 9 20:04:01.561169 kernel: ima: No architecture policies found Feb 9 20:04:01.561175 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 20:04:01.561181 kernel: Write protecting the kernel read-only data: 28672k Feb 9 20:04:01.561186 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 20:04:01.561191 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 20:04:01.561196 kernel: Run /init as init process Feb 9 20:04:01.561201 kernel: with arguments: Feb 9 20:04:01.561206 kernel: /init Feb 9 20:04:01.561211 kernel: with environment: Feb 9 20:04:01.561217 kernel: HOME=/ Feb 9 20:04:01.561224 kernel: TERM=linux Feb 9 20:04:01.561254 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 20:04:01.561261 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 20:04:01.561267 systemd[1]: Detected architecture x86-64. Feb 9 20:04:01.561273 systemd[1]: Running in initrd. Feb 9 20:04:01.561279 systemd[1]: No hostname configured, using default hostname. Feb 9 20:04:01.561284 systemd[1]: Hostname set to . Feb 9 20:04:01.561309 systemd[1]: Initializing machine ID from random generator. Feb 9 20:04:01.561315 systemd[1]: Queued start job for default target initrd.target. Feb 9 20:04:01.561321 systemd[1]: Started systemd-ask-password-console.path. Feb 9 20:04:01.561326 systemd[1]: Reached target cryptsetup.target. Feb 9 20:04:01.561331 systemd[1]: Reached target paths.target. Feb 9 20:04:01.561336 systemd[1]: Reached target slices.target. Feb 9 20:04:01.561341 systemd[1]: Reached target swap.target. Feb 9 20:04:01.561347 systemd[1]: Reached target timers.target. Feb 9 20:04:01.561352 systemd[1]: Listening on iscsid.socket. Feb 9 20:04:01.561359 systemd[1]: Listening on iscsiuio.socket. Feb 9 20:04:01.561364 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 20:04:01.561369 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 20:04:01.561375 systemd[1]: Listening on systemd-journald.socket. Feb 9 20:04:01.561380 systemd[1]: Listening on systemd-networkd.socket. Feb 9 20:04:01.561386 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 20:04:01.561391 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Feb 9 20:04:01.561396 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 20:04:01.561402 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Feb 9 20:04:01.561408 kernel: clocksource: Switched to clocksource tsc Feb 9 20:04:01.561413 systemd[1]: Reached target sockets.target. Feb 9 20:04:01.561418 systemd[1]: Starting kmod-static-nodes.service... Feb 9 20:04:01.561424 systemd[1]: Finished network-cleanup.service. Feb 9 20:04:01.561429 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 20:04:01.561434 systemd[1]: Starting systemd-journald.service... Feb 9 20:04:01.561440 systemd[1]: Starting systemd-modules-load.service... Feb 9 20:04:01.561447 systemd-journald[267]: Journal started Feb 9 20:04:01.561473 systemd-journald[267]: Runtime Journal (/run/log/journal/9e4496f312634414abb15fbb9f93dce5) is 8.0M, max 640.1M, 632.1M free. Feb 9 20:04:01.563810 systemd-modules-load[268]: Inserted module 'overlay' Feb 9 20:04:01.600306 kernel: audit: type=1334 audit(1707509041.569:2): prog-id=6 op=LOAD Feb 9 20:04:01.600317 systemd[1]: Starting systemd-resolved.service... Feb 9 20:04:01.569000 audit: BPF prog-id=6 op=LOAD Feb 9 20:04:01.636261 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 20:04:01.636276 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 20:04:01.668258 kernel: Bridge firewalling registered Feb 9 20:04:01.668275 systemd[1]: Started systemd-journald.service. Feb 9 20:04:01.682466 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 9 20:04:01.742315 kernel: audit: type=1130 audit(1707509041.689:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:01.742326 kernel: SCSI subsystem initialized Feb 9 20:04:01.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:01.688961 systemd-resolved[270]: Positive Trust Anchors: Feb 9 20:04:01.858338 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 20:04:01.858353 kernel: audit: type=1130 audit(1707509041.763:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:01.858360 kernel: device-mapper: uevent: version 1.0.3 Feb 9 20:04:01.858367 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 20:04:01.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:01.688968 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 20:04:01.927446 kernel: audit: type=1130 audit(1707509041.871:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:01.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:01.688988 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 20:04:02.026468 kernel: audit: type=1130 audit(1707509041.935:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:01.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:01.690474 systemd[1]: Finished kmod-static-nodes.service. Feb 9 20:04:02.086474 kernel: audit: type=1130 audit(1707509042.033:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:02.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:01.690498 systemd-resolved[270]: Defaulting to hostname 'linux'. Feb 9 20:04:02.150481 kernel: audit: type=1130 audit(1707509042.094:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:02.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:01.764197 systemd[1]: Started systemd-resolved.service. Feb 9 20:04:01.865869 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 9 20:04:01.872522 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 20:04:01.936503 systemd[1]: Finished systemd-modules-load.service. Feb 9 20:04:02.034599 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 20:04:02.095513 systemd[1]: Reached target nss-lookup.target. Feb 9 20:04:02.159897 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 20:04:02.173800 systemd[1]: Starting systemd-sysctl.service... Feb 9 20:04:02.182823 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 20:04:02.183517 systemd[1]: Finished systemd-sysctl.service. Feb 9 20:04:02.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:02.231319 kernel: audit: type=1130 audit(1707509042.182:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:02.185451 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 20:04:02.305448 kernel: audit: type=1130 audit(1707509042.245:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:02.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:02.246567 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 20:04:02.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:02.314796 systemd[1]: Starting dracut-cmdline.service... Feb 9 20:04:02.322410 dracut-cmdline[291]: dracut-dracut-053 Feb 9 20:04:02.322410 dracut-cmdline[291]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 20:04:02.322410 dracut-cmdline[291]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 20:04:02.402292 kernel: Loading iSCSI transport class v2.0-870. Feb 9 20:04:02.402306 kernel: iscsi: registered transport (tcp) Feb 9 20:04:02.453055 kernel: iscsi: registered transport (qla4xxx) Feb 9 20:04:02.453102 kernel: QLogic iSCSI HBA Driver Feb 9 20:04:02.468149 systemd[1]: Finished dracut-cmdline.service. Feb 9 20:04:02.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:02.468722 systemd[1]: Starting dracut-pre-udev.service... Feb 9 20:04:02.525286 kernel: raid6: avx2x4 gen() 47808 MB/s Feb 9 20:04:02.561254 kernel: raid6: avx2x4 xor() 20775 MB/s Feb 9 20:04:02.596289 kernel: raid6: avx2x2 gen() 53390 MB/s Feb 9 20:04:02.631253 kernel: raid6: avx2x2 xor() 32122 MB/s Feb 9 20:04:02.666293 kernel: raid6: avx2x1 gen() 45301 MB/s Feb 9 20:04:02.701254 kernel: raid6: avx2x1 xor() 27934 MB/s Feb 9 20:04:02.736289 kernel: raid6: sse2x4 gen() 21347 MB/s Feb 9 20:04:02.771253 kernel: raid6: sse2x4 xor() 11995 MB/s Feb 9 20:04:02.804261 kernel: raid6: sse2x2 gen() 21670 MB/s Feb 9 20:04:02.838254 kernel: raid6: sse2x2 xor() 13447 MB/s Feb 9 20:04:02.872289 kernel: raid6: sse2x1 gen() 18298 MB/s Feb 9 20:04:02.924295 kernel: raid6: sse2x1 xor() 8930 MB/s Feb 9 20:04:02.924311 kernel: raid6: using algorithm avx2x2 gen() 53390 MB/s Feb 9 20:04:02.924318 kernel: raid6: .... xor() 32122 MB/s, rmw enabled Feb 9 20:04:02.942519 kernel: raid6: using avx2x2 recovery algorithm Feb 9 20:04:02.989226 kernel: xor: automatically using best checksumming function avx Feb 9 20:04:03.068228 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 20:04:03.073113 systemd[1]: Finished dracut-pre-udev.service. Feb 9 20:04:03.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:03.080000 audit: BPF prog-id=7 op=LOAD Feb 9 20:04:03.080000 audit: BPF prog-id=8 op=LOAD Feb 9 20:04:03.082194 systemd[1]: Starting systemd-udevd.service... Feb 9 20:04:03.090546 systemd-udevd[473]: Using default interface naming scheme 'v252'. Feb 9 20:04:03.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:03.096407 systemd[1]: Started systemd-udevd.service. Feb 9 20:04:03.135346 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation Feb 9 20:04:03.111922 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 20:04:03.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:03.138399 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 20:04:03.152385 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 20:04:03.228446 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 20:04:03.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:03.257229 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 20:04:03.259225 kernel: libata version 3.00 loaded. Feb 9 20:04:03.259241 kernel: ACPI: bus type USB registered Feb 9 20:04:03.293727 kernel: usbcore: registered new interface driver usbfs Feb 9 20:04:03.293768 kernel: usbcore: registered new interface driver hub Feb 9 20:04:03.329116 kernel: usbcore: registered new device driver usb Feb 9 20:04:03.365766 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 20:04:03.365820 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 20:04:03.366228 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 20:04:03.407516 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 9 20:04:03.407592 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 20:04:03.407644 kernel: pps pps0: new PPS source ptp0 Feb 9 20:04:03.438830 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 9 20:04:03.438910 kernel: scsi host0: ahci Feb 9 20:04:03.438928 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 20:04:03.470216 kernel: scsi host1: ahci Feb 9 20:04:03.470242 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e7:b6 Feb 9 20:04:03.501576 kernel: scsi host2: ahci Feb 9 20:04:03.514713 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 9 20:04:03.529896 kernel: scsi host3: ahci Feb 9 20:04:03.529919 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 20:04:03.572006 kernel: scsi host4: ahci Feb 9 20:04:03.572080 kernel: pps pps1: new PPS source ptp1 Feb 9 20:04:03.572135 kernel: scsi host5: ahci Feb 9 20:04:03.584883 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 9 20:04:03.609039 kernel: scsi host6: ahci Feb 9 20:04:03.619777 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 20:04:03.619854 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Feb 9 20:04:03.634446 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e7:b7 Feb 9 20:04:03.649533 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Feb 9 20:04:03.692041 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 9 20:04:03.692115 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Feb 9 20:04:03.692124 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 20:04:03.707427 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Feb 9 20:04:03.753287 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Feb 9 20:04:03.753363 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Feb 9 20:04:03.753373 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 20:04:03.769506 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Feb 9 20:04:03.788258 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 20:04:03.788274 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 9 20:04:03.817972 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Feb 9 20:04:03.850225 kernel: AES CTR mode by8 optimization enabled Feb 9 20:04:04.054305 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 9 20:04:04.054386 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 20:04:04.108848 kernel: port_module: 8 callbacks suppressed Feb 9 20:04:04.108871 kernel: mlx5_core 0000:01:00.0: Port module event: module 0, Cable plugged Feb 9 20:04:04.142268 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 20:04:04.172226 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 20:04:04.172243 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 20:04:04.188228 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 20:04:04.205223 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 20:04:04.221259 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 20:04:04.237259 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 20:04:04.254253 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 20:04:04.270224 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 20:04:04.286252 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 20:04:04.328252 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 20:04:04.328324 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 20:04:04.362112 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Feb 9 20:04:04.362187 kernel: ata1.00: Features: NCQ-prio Feb 9 20:04:04.362197 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 20:04:04.376609 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 20:04:04.429099 kernel: ata2.00: Features: NCQ-prio Feb 9 20:04:04.449253 kernel: ata1.00: configured for UDMA/133 Feb 9 20:04:04.449269 kernel: ata2.00: configured for UDMA/133 Feb 9 20:04:04.449277 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 20:04:04.501240 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 20:04:04.540280 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 20:04:04.540489 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 20:04:04.578023 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 20:04:04.578095 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 20:04:04.578146 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 20:04:04.596272 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 20:04:04.643469 kernel: hub 1-0:1.0: USB hub found Feb 9 20:04:04.643568 kernel: hub 1-0:1.0: 16 ports detected Feb 9 20:04:04.643677 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 20:04:04.658864 kernel: hub 2-0:1.0: USB hub found Feb 9 20:04:04.658945 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:04:04.658954 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 20:04:04.659038 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 20:04:04.659107 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 20:04:04.659161 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 20:04:04.659214 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 20:04:04.659276 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 20:04:04.659332 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 20:04:04.673281 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 20:04:04.673296 kernel: hub 2-0:1.0: 10 ports detected Feb 9 20:04:04.673371 kernel: usb: port power management may be unreliable Feb 9 20:04:04.675271 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 20:04:04.679272 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 9 20:04:04.692258 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 20:04:04.692338 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 20:04:04.705692 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 20:04:04.738384 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 20:04:04.888291 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 20:04:04.888382 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 20:04:04.888440 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 20:04:04.888493 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 20:04:04.992704 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:04:05.026900 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 20:04:05.026943 kernel: GPT:9289727 != 937703087 Feb 9 20:04:05.026968 kernel: hub 1-14:1.0: USB hub found Feb 9 20:04:05.027041 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 20:04:05.056369 kernel: hub 1-14:1.0: 4 ports detected Feb 9 20:04:05.056486 kernel: GPT:9289727 != 937703087 Feb 9 20:04:05.056494 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 20:04:05.056502 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 20:04:05.127432 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:04:05.127447 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 20:04:05.160225 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Feb 9 20:04:05.175669 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 20:04:05.213549 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (536) Feb 9 20:04:05.213562 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Feb 9 20:04:05.213486 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 20:04:05.234133 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 20:04:05.258077 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 20:04:05.277429 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 20:04:05.292223 systemd[1]: Starting disk-uuid.service... Feb 9 20:04:05.327325 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:04:05.327338 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 20:04:05.327392 disk-uuid[690]: Primary Header is updated. Feb 9 20:04:05.327392 disk-uuid[690]: Secondary Entries is updated. Feb 9 20:04:05.327392 disk-uuid[690]: Secondary Header is updated. Feb 9 20:04:05.406306 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:04:05.406316 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 20:04:05.406322 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 20:04:05.406340 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:04:05.406347 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 20:04:05.522234 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 20:04:05.555710 kernel: usbcore: registered new interface driver usbhid Feb 9 20:04:05.555747 kernel: usbhid: USB HID core driver Feb 9 20:04:05.589323 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 20:04:05.707357 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 20:04:05.707599 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 20:04:05.707618 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 20:04:06.430041 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:04:06.450111 disk-uuid[691]: The operation has completed successfully. Feb 9 20:04:06.459458 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 20:04:06.493620 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 20:04:06.592478 kernel: audit: type=1130 audit(1707509046.500:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:06.592494 kernel: audit: type=1131 audit(1707509046.500:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:06.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:06.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:06.493662 systemd[1]: Finished disk-uuid.service. Feb 9 20:04:06.622323 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 20:04:06.510013 systemd[1]: Starting verity-setup.service... Feb 9 20:04:06.656270 systemd[1]: Found device dev-mapper-usr.device. Feb 9 20:04:06.657095 systemd[1]: Mounting sysusr-usr.mount... Feb 9 20:04:06.678494 systemd[1]: Finished verity-setup.service. Feb 9 20:04:06.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:06.740229 kernel: audit: type=1130 audit(1707509046.692:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:06.768761 systemd[1]: Mounted sysusr-usr.mount. Feb 9 20:04:06.782318 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 20:04:06.775521 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 20:04:06.878495 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 20:04:06.878510 kernel: BTRFS info (device sda6): using free space tree Feb 9 20:04:06.878517 kernel: BTRFS info (device sda6): has skinny extents Feb 9 20:04:06.878523 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 20:04:06.775916 systemd[1]: Starting ignition-setup.service... Feb 9 20:04:06.795646 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 20:04:06.887808 systemd[1]: Finished ignition-setup.service. Feb 9 20:04:06.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:06.909774 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 20:04:07.022301 kernel: audit: type=1130 audit(1707509046.908:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:07.022317 kernel: audit: type=1130 audit(1707509046.964:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:06.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:06.966253 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 20:04:07.029000 audit: BPF prog-id=9 op=LOAD Feb 9 20:04:07.031181 systemd[1]: Starting systemd-networkd.service... Feb 9 20:04:07.067294 kernel: audit: type=1334 audit(1707509047.029:24): prog-id=9 op=LOAD Feb 9 20:04:07.067295 systemd-networkd[874]: lo: Link UP Feb 9 20:04:07.067297 systemd-networkd[874]: lo: Gained carrier Feb 9 20:04:07.067566 systemd-networkd[874]: Enumeration completed Feb 9 20:04:07.143308 kernel: audit: type=1130 audit(1707509047.086:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:07.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:07.067635 systemd[1]: Started systemd-networkd.service. Feb 9 20:04:07.068238 systemd-networkd[874]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 20:04:07.087379 systemd[1]: Reached target network.target. Feb 9 20:04:07.151771 systemd[1]: Starting iscsiuio.service... Feb 9 20:04:07.260230 kernel: audit: type=1130 audit(1707509047.188:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:07.260247 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 20:04:07.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:07.165316 systemd[1]: Started iscsiuio.service. Feb 9 20:04:07.284798 iscsid[884]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 20:04:07.284798 iscsid[884]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 20:04:07.284798 iscsid[884]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 20:04:07.284798 iscsid[884]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 20:04:07.284798 iscsid[884]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 20:04:07.284798 iscsid[884]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 20:04:07.284798 iscsid[884]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 20:04:07.435674 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 9 20:04:07.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:07.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:07.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:07.190259 systemd[1]: Starting iscsid.service... Feb 9 20:04:07.272183 ignition[868]: Ignition 2.14.0 Feb 9 20:04:07.261242 systemd-networkd[874]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 20:04:07.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:07.272187 ignition[868]: Stage: fetch-offline Feb 9 20:04:07.517344 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 20:04:07.275364 systemd[1]: Started iscsid.service. Feb 9 20:04:07.272213 ignition[868]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:04:07.282778 unknown[868]: fetched base config from "system" Feb 9 20:04:07.272229 ignition[868]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:04:07.282782 unknown[868]: fetched user config from "system" Feb 9 20:04:07.279289 ignition[868]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:04:07.295466 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 20:04:07.279385 ignition[868]: parsed url from cmdline: "" Feb 9 20:04:07.314784 systemd[1]: Starting dracut-initqueue.service... Feb 9 20:04:07.279387 ignition[868]: no config URL provided Feb 9 20:04:07.348303 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 20:04:07.279389 ignition[868]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 20:04:07.348741 systemd[1]: Starting ignition-kargs.service... Feb 9 20:04:07.279403 ignition[868]: parsing config with SHA512: a70bb816e9eb9e790cea118799baae278a39da5ddd6ff9d5dabeacea459ea1407f162cecfef78f06b1c0e8b2e808d3f040cdc571abd36dcea57754bb9fe686a1 Feb 9 20:04:07.376545 systemd[1]: Finished dracut-initqueue.service. Feb 9 20:04:07.282928 ignition[868]: fetch-offline: fetch-offline passed Feb 9 20:04:07.392544 systemd[1]: Reached target remote-fs-pre.target. Feb 9 20:04:07.282931 ignition[868]: POST message to Packet Timeline Feb 9 20:04:07.410399 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 20:04:07.282935 ignition[868]: POST Status error: resource requires networking Feb 9 20:04:07.435531 systemd[1]: Reached target remote-fs.target. Feb 9 20:04:07.282966 ignition[868]: Ignition finished successfully Feb 9 20:04:07.454067 systemd[1]: Starting dracut-pre-mount.service... Feb 9 20:04:07.353469 ignition[900]: Ignition 2.14.0 Feb 9 20:04:07.467506 systemd[1]: Finished dracut-pre-mount.service. Feb 9 20:04:07.353472 ignition[900]: Stage: kargs Feb 9 20:04:07.512653 systemd-networkd[874]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 20:04:07.353528 ignition[900]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:04:07.541386 systemd-networkd[874]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 20:04:07.353537 ignition[900]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:04:07.569873 systemd-networkd[874]: enp1s0f1np1: Link UP Feb 9 20:04:07.356634 ignition[900]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:04:07.570118 systemd-networkd[874]: enp1s0f1np1: Gained carrier Feb 9 20:04:07.357040 ignition[900]: kargs: kargs passed Feb 9 20:04:07.581700 systemd-networkd[874]: enp1s0f0np0: Link UP Feb 9 20:04:07.357043 ignition[900]: POST message to Packet Timeline Feb 9 20:04:07.582027 systemd-networkd[874]: eno2: Link UP Feb 9 20:04:07.357053 ignition[900]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 20:04:07.582360 systemd-networkd[874]: eno1: Link UP Feb 9 20:04:07.360717 ignition[900]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48396->[::1]:53: read: connection refused Feb 9 20:04:07.561216 ignition[900]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 20:04:07.561730 ignition[900]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:41815->[::1]:53: read: connection refused Feb 9 20:04:07.962245 ignition[900]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 20:04:07.963405 ignition[900]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60366->[::1]:53: read: connection refused Feb 9 20:04:08.300470 systemd-networkd[874]: enp1s0f0np0: Gained carrier Feb 9 20:04:08.310472 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 9 20:04:08.337538 systemd-networkd[874]: enp1s0f0np0: DHCPv4 address 147.75.49.127/31, gateway 147.75.49.126 acquired from 145.40.83.140 Feb 9 20:04:08.763893 ignition[900]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 20:04:08.765121 ignition[900]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:46900->[::1]:53: read: connection refused Feb 9 20:04:08.789749 systemd-networkd[874]: enp1s0f1np1: Gained IPv6LL Feb 9 20:04:09.749511 systemd-networkd[874]: enp1s0f0np0: Gained IPv6LL Feb 9 20:04:10.366377 ignition[900]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 20:04:10.367594 ignition[900]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:38377->[::1]:53: read: connection refused Feb 9 20:04:13.570202 ignition[900]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 20:04:13.607496 ignition[900]: GET result: OK Feb 9 20:04:13.813836 ignition[900]: Ignition finished successfully Feb 9 20:04:13.831910 systemd[1]: Finished ignition-kargs.service. Feb 9 20:04:13.916636 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 20:04:13.916652 kernel: audit: type=1130 audit(1707509053.840:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:13.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:13.851314 ignition[919]: Ignition 2.14.0 Feb 9 20:04:13.843470 systemd[1]: Starting ignition-disks.service... Feb 9 20:04:13.851317 ignition[919]: Stage: disks Feb 9 20:04:13.851413 ignition[919]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:04:13.851421 ignition[919]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:04:13.854115 ignition[919]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:04:13.854588 ignition[919]: disks: disks passed Feb 9 20:04:13.854591 ignition[919]: POST message to Packet Timeline Feb 9 20:04:13.854600 ignition[919]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 20:04:13.877586 ignition[919]: GET result: OK Feb 9 20:04:14.075111 ignition[919]: Ignition finished successfully Feb 9 20:04:14.077750 systemd[1]: Finished ignition-disks.service. Feb 9 20:04:14.155314 kernel: audit: type=1130 audit(1707509054.090:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.091913 systemd[1]: Reached target initrd-root-device.target. Feb 9 20:04:14.163413 systemd[1]: Reached target local-fs-pre.target. Feb 9 20:04:14.163454 systemd[1]: Reached target local-fs.target. Feb 9 20:04:14.186433 systemd[1]: Reached target sysinit.target. Feb 9 20:04:14.200446 systemd[1]: Reached target basic.target. Feb 9 20:04:14.214110 systemd[1]: Starting systemd-fsck-root.service... Feb 9 20:04:14.236519 systemd-fsck[935]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 20:04:14.247854 systemd[1]: Finished systemd-fsck-root.service. Feb 9 20:04:14.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.258639 systemd[1]: Mounting sysroot.mount... Feb 9 20:04:14.334372 kernel: audit: type=1130 audit(1707509054.255:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.334412 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 20:04:14.354122 systemd[1]: Mounted sysroot.mount. Feb 9 20:04:14.361464 systemd[1]: Reached target initrd-root-fs.target. Feb 9 20:04:14.377342 systemd[1]: Mounting sysroot-usr.mount... Feb 9 20:04:14.392809 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 20:04:14.408183 systemd[1]: Starting flatcar-static-network.service... Feb 9 20:04:14.423406 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 20:04:14.423424 systemd[1]: Reached target ignition-diskful.target. Feb 9 20:04:14.440081 systemd[1]: Mounted sysroot-usr.mount. Feb 9 20:04:14.508396 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (948) Feb 9 20:04:14.463856 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 20:04:14.605832 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 20:04:14.605853 kernel: BTRFS info (device sda6): using free space tree Feb 9 20:04:14.605865 kernel: BTRFS info (device sda6): has skinny extents Feb 9 20:04:14.605872 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 20:04:14.605934 coreos-metadata[943]: Feb 09 20:04:14.520 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 20:04:14.605934 coreos-metadata[943]: Feb 09 20:04:14.544 INFO Fetch successful Feb 9 20:04:14.733942 kernel: audit: type=1130 audit(1707509054.614:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.733954 kernel: audit: type=1130 audit(1707509054.677:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.734002 coreos-metadata[942]: Feb 09 20:04:14.520 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 20:04:14.734002 coreos-metadata[942]: Feb 09 20:04:14.549 INFO Fetch successful Feb 9 20:04:14.734002 coreos-metadata[942]: Feb 09 20:04:14.566 INFO wrote hostname ci-3510.3.2-a-1a2370b287 to /sysroot/etc/hostname Feb 9 20:04:14.888439 kernel: audit: type=1130 audit(1707509054.741:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.888516 kernel: audit: type=1131 audit(1707509054.741:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.477611 systemd[1]: Starting initrd-setup-root.service... Feb 9 20:04:14.524947 systemd[1]: Finished initrd-setup-root.service. Feb 9 20:04:14.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.940376 initrd-setup-root[953]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 20:04:14.980424 kernel: audit: type=1130 audit(1707509054.911:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.616566 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 20:04:14.990433 initrd-setup-root[961]: cut: /sysroot/etc/group: No such file or directory Feb 9 20:04:14.678546 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 20:04:15.012384 initrd-setup-root[969]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 20:04:15.022433 ignition[1017]: INFO : Ignition 2.14.0 Feb 9 20:04:15.022433 ignition[1017]: INFO : Stage: mount Feb 9 20:04:15.022433 ignition[1017]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:04:15.022433 ignition[1017]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:04:15.022433 ignition[1017]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:04:15.022433 ignition[1017]: INFO : mount: mount passed Feb 9 20:04:15.022433 ignition[1017]: INFO : POST message to Packet Timeline Feb 9 20:04:15.022433 ignition[1017]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 20:04:15.022433 ignition[1017]: INFO : GET result: OK Feb 9 20:04:14.678585 systemd[1]: Finished flatcar-static-network.service. Feb 9 20:04:15.120515 initrd-setup-root[977]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 20:04:14.742487 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 20:04:15.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.195839 ignition[1017]: INFO : Ignition finished successfully Feb 9 20:04:15.210478 kernel: audit: type=1130 audit(1707509055.138:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:14.861813 systemd[1]: Starting ignition-mount.service... Feb 9 20:04:15.254358 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1036) Feb 9 20:04:15.254369 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 20:04:14.872308 systemd[1]: Starting sysroot-boot.service... Feb 9 20:04:15.303341 kernel: BTRFS info (device sda6): using free space tree Feb 9 20:04:15.303352 kernel: BTRFS info (device sda6): has skinny extents Feb 9 20:04:15.303359 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 20:04:14.895714 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 20:04:14.895754 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 20:04:14.902354 systemd[1]: Finished sysroot-boot.service. Feb 9 20:04:15.125582 systemd[1]: Finished ignition-mount.service. Feb 9 20:04:15.141785 systemd[1]: Starting ignition-files.service... Feb 9 20:04:15.396349 ignition[1055]: INFO : Ignition 2.14.0 Feb 9 20:04:15.396349 ignition[1055]: INFO : Stage: files Feb 9 20:04:15.396349 ignition[1055]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:04:15.396349 ignition[1055]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:04:15.396349 ignition[1055]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:04:15.396349 ignition[1055]: DEBUG : files: compiled without relabeling support, skipping Feb 9 20:04:15.396349 ignition[1055]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 20:04:15.396349 ignition[1055]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 20:04:15.396349 ignition[1055]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 20:04:15.396349 ignition[1055]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 20:04:15.396349 ignition[1055]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 20:04:15.396349 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 20:04:15.396349 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 20:04:15.396349 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 20:04:15.396349 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 20:04:15.396349 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem728301582" Feb 9 20:04:15.396349 ignition[1055]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem728301582": device or resource busy Feb 9 20:04:15.396349 ignition[1055]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem728301582", trying btrfs: device or resource busy Feb 9 20:04:15.396349 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem728301582" Feb 9 20:04:15.685507 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1059) Feb 9 20:04:15.204012 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 20:04:15.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.750876 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem728301582" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem728301582" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem728301582" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(a): [started] processing unit "etcd-member.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(d): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(d): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(e): [started] setting preset to enabled for "etcd-member.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: op(e): [finished] setting preset to enabled for "etcd-member.service" Feb 9 20:04:15.750876 ignition[1055]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 20:04:16.125546 kernel: audit: type=1130 audit(1707509055.692:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.338208 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 20:04:16.140549 ignition[1055]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 20:04:16.140549 ignition[1055]: INFO : files: files passed Feb 9 20:04:16.140549 ignition[1055]: INFO : POST message to Packet Timeline Feb 9 20:04:16.140549 ignition[1055]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 20:04:16.140549 ignition[1055]: INFO : GET result: OK Feb 9 20:04:16.140549 ignition[1055]: INFO : Ignition finished successfully Feb 9 20:04:16.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.375643 unknown[1055]: wrote ssh authorized keys file for user: core Feb 9 20:04:15.411698 systemd[1]: mnt-oem728301582.mount: Deactivated successfully. Feb 9 20:04:16.278551 initrd-setup-root-after-ignition[1086]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 20:04:15.671047 systemd[1]: Finished ignition-files.service. Feb 9 20:04:15.700377 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 20:04:15.759490 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 20:04:15.759809 systemd[1]: Starting ignition-quench.service... Feb 9 20:04:16.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.798611 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 20:04:15.822698 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 20:04:16.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.822795 systemd[1]: Finished ignition-quench.service. Feb 9 20:04:16.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.849886 systemd[1]: Reached target ignition-complete.target. Feb 9 20:04:15.864430 systemd[1]: Starting initrd-parse-etc.service... Feb 9 20:04:15.915209 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 20:04:15.915478 systemd[1]: Finished initrd-parse-etc.service. Feb 9 20:04:15.921970 systemd[1]: Reached target initrd-fs.target. Feb 9 20:04:16.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.955479 systemd[1]: Reached target initrd.target. Feb 9 20:04:16.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.982739 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 20:04:16.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:15.985028 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 20:04:16.549347 ignition[1101]: INFO : Ignition 2.14.0 Feb 9 20:04:16.549347 ignition[1101]: INFO : Stage: umount Feb 9 20:04:16.549347 ignition[1101]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:04:16.549347 ignition[1101]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:04:16.549347 ignition[1101]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:04:16.549347 ignition[1101]: INFO : umount: umount passed Feb 9 20:04:16.549347 ignition[1101]: INFO : POST message to Packet Timeline Feb 9 20:04:16.549347 ignition[1101]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 20:04:16.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.696033 iscsid[884]: iscsid shutting down. Feb 9 20:04:16.018382 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 20:04:16.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.723775 ignition[1101]: INFO : GET result: OK Feb 9 20:04:16.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.037502 systemd[1]: Starting initrd-cleanup.service... Feb 9 20:04:16.072335 systemd[1]: Stopped target nss-lookup.target. Feb 9 20:04:16.769670 ignition[1101]: INFO : Ignition finished successfully Feb 9 20:04:16.088866 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 20:04:16.109909 systemd[1]: Stopped target timers.target. Feb 9 20:04:16.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.132851 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 20:04:16.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.133233 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 20:04:16.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.842000 audit: BPF prog-id=6 op=UNLOAD Feb 9 20:04:16.149115 systemd[1]: Stopped target initrd.target. Feb 9 20:04:16.171866 systemd[1]: Stopped target basic.target. Feb 9 20:04:16.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.185870 systemd[1]: Stopped target ignition-complete.target. Feb 9 20:04:16.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.203957 systemd[1]: Stopped target ignition-diskful.target. Feb 9 20:04:16.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.221860 systemd[1]: Stopped target initrd-root-device.target. Feb 9 20:04:16.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.237879 systemd[1]: Stopped target remote-fs.target. Feb 9 20:04:16.253862 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 20:04:16.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.270890 systemd[1]: Stopped target sysinit.target. Feb 9 20:04:16.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.286869 systemd[1]: Stopped target local-fs.target. Feb 9 20:04:16.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.308828 systemd[1]: Stopped target local-fs-pre.target. Feb 9 20:04:16.323943 systemd[1]: Stopped target swap.target. Feb 9 20:04:17.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.340734 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 20:04:16.341102 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 20:04:16.367080 systemd[1]: Stopped target cryptsetup.target. Feb 9 20:04:17.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.381748 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 20:04:17.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.382112 systemd[1]: Stopped dracut-initqueue.service. Feb 9 20:04:17.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.398001 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 20:04:16.398379 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 20:04:17.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.413985 systemd[1]: Stopped target paths.target. Feb 9 20:04:17.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:17.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.427669 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 20:04:16.431600 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 20:04:16.443844 systemd[1]: Stopped target slices.target. Feb 9 20:04:16.458849 systemd[1]: Stopped target sockets.target. Feb 9 20:04:16.476017 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 20:04:16.476437 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 20:04:16.492971 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 20:04:16.493353 systemd[1]: Stopped ignition-files.service. Feb 9 20:04:16.507894 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 20:04:16.508252 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 20:04:16.525059 systemd[1]: Stopping ignition-mount.service... Feb 9 20:04:16.540494 systemd[1]: Stopping iscsid.service... Feb 9 20:04:16.557391 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 20:04:16.557566 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 20:04:16.576116 systemd[1]: Stopping sysroot-boot.service... Feb 9 20:04:16.587459 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 20:04:16.587970 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 20:04:17.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:16.599046 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 20:04:16.599404 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 20:04:16.636848 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 20:04:16.637518 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 20:04:16.637589 systemd[1]: Stopped iscsid.service. Feb 9 20:04:16.652811 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 20:04:16.652894 systemd[1]: Stopped sysroot-boot.service. Feb 9 20:04:17.377262 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 9 20:04:16.669473 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 20:04:16.669603 systemd[1]: Closed iscsid.socket. Feb 9 20:04:16.684697 systemd[1]: Stopping iscsiuio.service... Feb 9 20:04:16.702948 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 20:04:16.703167 systemd[1]: Stopped iscsiuio.service. Feb 9 20:04:16.717143 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 20:04:16.717383 systemd[1]: Finished initrd-cleanup.service. Feb 9 20:04:16.733716 systemd[1]: Stopped target network.target. Feb 9 20:04:16.747515 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 20:04:16.747621 systemd[1]: Closed iscsiuio.socket. Feb 9 20:04:16.761835 systemd[1]: Stopping systemd-networkd.service... Feb 9 20:04:16.772371 systemd-networkd[874]: enp1s0f0np0: DHCPv6 lease lost Feb 9 20:04:16.777657 systemd[1]: Stopping systemd-resolved.service... Feb 9 20:04:16.780400 systemd-networkd[874]: enp1s0f1np1: DHCPv6 lease lost Feb 9 20:04:17.376000 audit: BPF prog-id=9 op=UNLOAD Feb 9 20:04:16.793102 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 20:04:16.793358 systemd[1]: Stopped systemd-resolved.service. Feb 9 20:04:16.810097 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 20:04:16.810366 systemd[1]: Stopped systemd-networkd.service. Feb 9 20:04:16.826544 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 20:04:16.826591 systemd[1]: Stopped ignition-mount.service. Feb 9 20:04:16.843890 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 20:04:16.843989 systemd[1]: Closed systemd-networkd.socket. Feb 9 20:04:16.858473 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 20:04:16.858602 systemd[1]: Stopped ignition-disks.service. Feb 9 20:04:16.873534 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 20:04:16.873657 systemd[1]: Stopped ignition-kargs.service. Feb 9 20:04:16.888645 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 20:04:16.888792 systemd[1]: Stopped ignition-setup.service. Feb 9 20:04:16.904632 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 20:04:16.904772 systemd[1]: Stopped initrd-setup-root.service. Feb 9 20:04:16.922240 systemd[1]: Stopping network-cleanup.service... Feb 9 20:04:16.935455 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 20:04:16.935619 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 20:04:16.950606 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 20:04:16.950732 systemd[1]: Stopped systemd-sysctl.service. Feb 9 20:04:16.966923 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 20:04:16.967063 systemd[1]: Stopped systemd-modules-load.service. Feb 9 20:04:16.981750 systemd[1]: Stopping systemd-udevd.service... Feb 9 20:04:17.000156 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 20:04:17.001540 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 20:04:17.001852 systemd[1]: Stopped systemd-udevd.service. Feb 9 20:04:17.013980 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 20:04:17.014107 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 20:04:17.026631 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 20:04:17.026731 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 20:04:17.042609 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 20:04:17.042735 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 20:04:17.057669 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 20:04:17.057793 systemd[1]: Stopped dracut-cmdline.service. Feb 9 20:04:17.072634 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 20:04:17.072757 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 20:04:17.090407 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 20:04:17.103417 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 20:04:17.103655 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 20:04:17.122514 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 20:04:17.122811 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 20:04:17.272831 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 20:04:17.273085 systemd[1]: Stopped network-cleanup.service. Feb 9 20:04:17.287839 systemd[1]: Reached target initrd-switch-root.target. Feb 9 20:04:17.306082 systemd[1]: Starting initrd-switch-root.service... Feb 9 20:04:17.332597 systemd[1]: Switching root. Feb 9 20:04:17.379590 systemd-journald[267]: Journal stopped Feb 9 20:04:21.097643 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 20:04:21.097660 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 20:04:21.097669 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 20:04:21.097675 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 20:04:21.097680 kernel: SELinux: policy capability open_perms=1 Feb 9 20:04:21.097685 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 20:04:21.097691 kernel: SELinux: policy capability always_check_network=0 Feb 9 20:04:21.097696 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 20:04:21.097702 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 20:04:21.097708 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 20:04:21.097713 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 20:04:21.097719 systemd[1]: Successfully loaded SELinux policy in 298.984ms. Feb 9 20:04:21.097726 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.574ms. Feb 9 20:04:21.097733 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 20:04:21.097741 systemd[1]: Detected architecture x86-64. Feb 9 20:04:21.097747 systemd[1]: Detected first boot. Feb 9 20:04:21.097753 systemd[1]: Hostname set to . Feb 9 20:04:21.097759 systemd[1]: Initializing machine ID from random generator. Feb 9 20:04:21.097765 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 20:04:21.097771 systemd[1]: Populated /etc with preset unit settings. Feb 9 20:04:21.097777 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 20:04:21.097785 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 20:04:21.097792 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 20:04:21.097798 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 9 20:04:21.097804 kernel: audit: type=1334 audit(1707509059.644:92): prog-id=12 op=LOAD Feb 9 20:04:21.097809 kernel: audit: type=1334 audit(1707509059.644:93): prog-id=3 op=UNLOAD Feb 9 20:04:21.097815 kernel: audit: type=1334 audit(1707509059.706:94): prog-id=13 op=LOAD Feb 9 20:04:21.097820 kernel: audit: type=1334 audit(1707509059.727:95): prog-id=14 op=LOAD Feb 9 20:04:21.097827 kernel: audit: type=1334 audit(1707509059.727:96): prog-id=4 op=UNLOAD Feb 9 20:04:21.097833 kernel: audit: type=1334 audit(1707509059.727:97): prog-id=5 op=UNLOAD Feb 9 20:04:21.097838 kernel: audit: type=1334 audit(1707509059.768:98): prog-id=15 op=LOAD Feb 9 20:04:21.097843 kernel: audit: type=1334 audit(1707509059.768:99): prog-id=12 op=UNLOAD Feb 9 20:04:21.097849 kernel: audit: type=1334 audit(1707509059.806:100): prog-id=16 op=LOAD Feb 9 20:04:21.097854 kernel: audit: type=1334 audit(1707509059.843:101): prog-id=17 op=LOAD Feb 9 20:04:21.097860 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 20:04:21.097866 systemd[1]: Stopped initrd-switch-root.service. Feb 9 20:04:21.097873 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 20:04:21.097880 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 20:04:21.097886 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 20:04:21.097892 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 20:04:21.097900 systemd[1]: Created slice system-getty.slice. Feb 9 20:04:21.097906 systemd[1]: Created slice system-modprobe.slice. Feb 9 20:04:21.097912 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 20:04:21.097918 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 20:04:21.097926 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 20:04:21.097932 systemd[1]: Created slice user.slice. Feb 9 20:04:21.097938 systemd[1]: Started systemd-ask-password-console.path. Feb 9 20:04:21.097944 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 20:04:21.097951 systemd[1]: Set up automount boot.automount. Feb 9 20:04:21.097957 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 20:04:21.097963 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 20:04:21.097969 systemd[1]: Stopped target initrd-fs.target. Feb 9 20:04:21.097976 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 20:04:21.097983 systemd[1]: Reached target integritysetup.target. Feb 9 20:04:21.097989 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 20:04:21.097996 systemd[1]: Reached target remote-fs.target. Feb 9 20:04:21.098002 systemd[1]: Reached target slices.target. Feb 9 20:04:21.098008 systemd[1]: Reached target swap.target. Feb 9 20:04:21.098014 systemd[1]: Reached target torcx.target. Feb 9 20:04:21.098021 systemd[1]: Reached target veritysetup.target. Feb 9 20:04:21.098027 systemd[1]: Listening on systemd-coredump.socket. Feb 9 20:04:21.098034 systemd[1]: Listening on systemd-initctl.socket. Feb 9 20:04:21.098040 systemd[1]: Listening on systemd-networkd.socket. Feb 9 20:04:21.098047 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 20:04:21.098053 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 20:04:21.098061 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 20:04:21.098067 systemd[1]: Mounting dev-hugepages.mount... Feb 9 20:04:21.098074 systemd[1]: Mounting dev-mqueue.mount... Feb 9 20:04:21.098080 systemd[1]: Mounting media.mount... Feb 9 20:04:21.098087 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 20:04:21.098093 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 20:04:21.098100 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 20:04:21.098106 systemd[1]: Mounting tmp.mount... Feb 9 20:04:21.098112 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 20:04:21.098120 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 20:04:21.098126 systemd[1]: Starting kmod-static-nodes.service... Feb 9 20:04:21.098133 systemd[1]: Starting modprobe@configfs.service... Feb 9 20:04:21.098139 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 20:04:21.098145 systemd[1]: Starting modprobe@drm.service... Feb 9 20:04:21.098152 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 20:04:21.098158 systemd[1]: Starting modprobe@fuse.service... Feb 9 20:04:21.098164 kernel: fuse: init (API version 7.34) Feb 9 20:04:21.098170 systemd[1]: Starting modprobe@loop.service... Feb 9 20:04:21.098177 kernel: loop: module loaded Feb 9 20:04:21.098184 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 20:04:21.098190 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 20:04:21.098197 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 20:04:21.098203 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 20:04:21.098210 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 20:04:21.098216 systemd[1]: Stopped systemd-journald.service. Feb 9 20:04:21.098226 systemd[1]: Starting systemd-journald.service... Feb 9 20:04:21.098233 systemd[1]: Starting systemd-modules-load.service... Feb 9 20:04:21.098242 systemd-journald[1255]: Journal started Feb 9 20:04:21.098266 systemd-journald[1255]: Runtime Journal (/run/log/journal/09d486f734094cc7951ce5f46efc35aa) is 8.0M, max 640.1M, 632.1M free. Feb 9 20:04:17.779000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 20:04:18.039000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 20:04:18.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 20:04:18.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 20:04:18.041000 audit: BPF prog-id=10 op=LOAD Feb 9 20:04:18.041000 audit: BPF prog-id=10 op=UNLOAD Feb 9 20:04:18.041000 audit: BPF prog-id=11 op=LOAD Feb 9 20:04:18.041000 audit: BPF prog-id=11 op=UNLOAD Feb 9 20:04:18.111000 audit[1143]: AVC avc: denied { associate } for pid=1143 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 20:04:18.111000 audit[1143]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1126 pid=1143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:04:18.111000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 20:04:18.135000 audit[1143]: AVC avc: denied { associate } for pid=1143 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 20:04:18.135000 audit[1143]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=1126 pid=1143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:04:18.135000 audit: CWD cwd="/" Feb 9 20:04:18.135000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:18.135000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:18.135000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 20:04:19.644000 audit: BPF prog-id=12 op=LOAD Feb 9 20:04:19.644000 audit: BPF prog-id=3 op=UNLOAD Feb 9 20:04:19.706000 audit: BPF prog-id=13 op=LOAD Feb 9 20:04:19.727000 audit: BPF prog-id=14 op=LOAD Feb 9 20:04:19.727000 audit: BPF prog-id=4 op=UNLOAD Feb 9 20:04:19.727000 audit: BPF prog-id=5 op=UNLOAD Feb 9 20:04:19.768000 audit: BPF prog-id=15 op=LOAD Feb 9 20:04:19.768000 audit: BPF prog-id=12 op=UNLOAD Feb 9 20:04:19.806000 audit: BPF prog-id=16 op=LOAD Feb 9 20:04:19.843000 audit: BPF prog-id=17 op=LOAD Feb 9 20:04:19.843000 audit: BPF prog-id=13 op=UNLOAD Feb 9 20:04:19.843000 audit: BPF prog-id=14 op=UNLOAD Feb 9 20:04:19.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:19.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:19.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:19.927000 audit: BPF prog-id=15 op=UNLOAD Feb 9 20:04:21.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.069000 audit: BPF prog-id=18 op=LOAD Feb 9 20:04:21.070000 audit: BPF prog-id=19 op=LOAD Feb 9 20:04:21.070000 audit: BPF prog-id=20 op=LOAD Feb 9 20:04:21.070000 audit: BPF prog-id=16 op=UNLOAD Feb 9 20:04:21.070000 audit: BPF prog-id=17 op=UNLOAD Feb 9 20:04:21.094000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 20:04:21.094000 audit[1255]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffcf002900 a2=4000 a3=7fffcf00299c items=0 ppid=1 pid=1255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:04:21.094000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 20:04:19.643765 systemd[1]: Queued start job for default target multi-user.target. Feb 9 20:04:18.110701 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 20:04:19.845307 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 20:04:18.111158 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 20:04:18.111173 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 20:04:18.111196 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 20:04:18.111204 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 20:04:18.111230 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 20:04:18.111239 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 20:04:18.111375 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 20:04:18.111402 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 20:04:18.111412 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 20:04:18.111867 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 20:04:18.111894 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 20:04:18.111909 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 20:04:18.111920 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 20:04:18.111933 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 20:04:18.111944 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 20:04:19.306205 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:19Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 20:04:19.306352 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:19Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 20:04:19.306408 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:19Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 20:04:19.306502 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:19Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 20:04:19.306532 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:19Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 20:04:19.306567 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-02-09T20:04:19Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 20:04:21.130411 systemd[1]: Starting systemd-network-generator.service... Feb 9 20:04:21.153272 systemd[1]: Starting systemd-remount-fs.service... Feb 9 20:04:21.176295 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 20:04:21.208805 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 20:04:21.208825 systemd[1]: Stopped verity-setup.service. Feb 9 20:04:21.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.243270 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 20:04:21.257273 systemd[1]: Started systemd-journald.service. Feb 9 20:04:21.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.266746 systemd[1]: Mounted dev-hugepages.mount. Feb 9 20:04:21.273490 systemd[1]: Mounted dev-mqueue.mount. Feb 9 20:04:21.281490 systemd[1]: Mounted media.mount. Feb 9 20:04:21.289479 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 20:04:21.298471 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 20:04:21.307454 systemd[1]: Mounted tmp.mount. Feb 9 20:04:21.314538 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 20:04:21.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.323557 systemd[1]: Finished kmod-static-nodes.service. Feb 9 20:04:21.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.331611 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 20:04:21.331729 systemd[1]: Finished modprobe@configfs.service. Feb 9 20:04:21.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.340685 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 20:04:21.340883 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 20:04:21.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.349845 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 20:04:21.350084 systemd[1]: Finished modprobe@drm.service. Feb 9 20:04:21.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.359154 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 20:04:21.359627 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 20:04:21.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.369160 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 20:04:21.369571 systemd[1]: Finished modprobe@fuse.service. Feb 9 20:04:21.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.379058 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 20:04:21.379385 systemd[1]: Finished modprobe@loop.service. Feb 9 20:04:21.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.388053 systemd[1]: Finished systemd-modules-load.service. Feb 9 20:04:21.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.397004 systemd[1]: Finished systemd-network-generator.service. Feb 9 20:04:21.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.406130 systemd[1]: Finished systemd-remount-fs.service. Feb 9 20:04:21.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.415191 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 20:04:21.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.424667 systemd[1]: Reached target network-pre.target. Feb 9 20:04:21.436054 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 20:04:21.444901 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 20:04:21.452411 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 20:04:21.453442 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 20:04:21.460844 systemd[1]: Starting systemd-journal-flush.service... Feb 9 20:04:21.464747 systemd-journald[1255]: Time spent on flushing to /var/log/journal/09d486f734094cc7951ce5f46efc35aa is 17.613ms for 1557 entries. Feb 9 20:04:21.464747 systemd-journald[1255]: System Journal (/var/log/journal/09d486f734094cc7951ce5f46efc35aa) is 8.0M, max 195.6M, 187.6M free. Feb 9 20:04:21.501230 systemd-journald[1255]: Received client request to flush runtime journal. Feb 9 20:04:21.477328 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 20:04:21.477897 systemd[1]: Starting systemd-random-seed.service... Feb 9 20:04:21.488333 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 20:04:21.488921 systemd[1]: Starting systemd-sysctl.service... Feb 9 20:04:21.495903 systemd[1]: Starting systemd-sysusers.service... Feb 9 20:04:21.502793 systemd[1]: Starting systemd-udev-settle.service... Feb 9 20:04:21.510425 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 20:04:21.518403 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 20:04:21.526438 systemd[1]: Finished systemd-journal-flush.service. Feb 9 20:04:21.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.534463 systemd[1]: Finished systemd-random-seed.service. Feb 9 20:04:21.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.542423 systemd[1]: Finished systemd-sysctl.service. Feb 9 20:04:21.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.550433 systemd[1]: Finished systemd-sysusers.service. Feb 9 20:04:21.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.559406 systemd[1]: Reached target first-boot-complete.target. Feb 9 20:04:21.567540 udevadm[1271]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 20:04:21.772496 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 20:04:21.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.781000 audit: BPF prog-id=21 op=LOAD Feb 9 20:04:21.782000 audit: BPF prog-id=22 op=LOAD Feb 9 20:04:21.782000 audit: BPF prog-id=7 op=UNLOAD Feb 9 20:04:21.782000 audit: BPF prog-id=8 op=UNLOAD Feb 9 20:04:21.783640 systemd[1]: Starting systemd-udevd.service... Feb 9 20:04:21.795546 systemd-udevd[1272]: Using default interface naming scheme 'v252'. Feb 9 20:04:21.812893 systemd[1]: Started systemd-udevd.service. Feb 9 20:04:21.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:21.823415 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 20:04:21.822000 audit: BPF prog-id=23 op=LOAD Feb 9 20:04:21.824564 systemd[1]: Starting systemd-networkd.service... Feb 9 20:04:21.856316 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 20:04:21.856383 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 20:04:21.855000 audit: BPF prog-id=24 op=LOAD Feb 9 20:04:21.855000 audit: BPF prog-id=25 op=LOAD Feb 9 20:04:21.855000 audit: BPF prog-id=26 op=LOAD Feb 9 20:04:21.859194 systemd[1]: Starting systemd-userdbd.service... Feb 9 20:04:21.861226 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 20:04:21.861254 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 20:04:21.861268 kernel: IPMI message handler: version 39.2 Feb 9 20:04:21.904231 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1286) Feb 9 20:04:21.924284 kernel: ACPI: button: Power Button [PWRF] Feb 9 20:04:21.857000 audit[1338]: AVC avc: denied { confidentiality } for pid=1338 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 20:04:21.857000 audit[1338]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56463e567340 a1=4d8bc a2=7efc20119bc5 a3=5 items=42 ppid=1272 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:04:21.857000 audit: CWD cwd="/" Feb 9 20:04:21.857000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=1 name=(null) inode=25986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=2 name=(null) inode=25986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=3 name=(null) inode=25987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=4 name=(null) inode=25986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=5 name=(null) inode=25988 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=6 name=(null) inode=25986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=7 name=(null) inode=25989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=8 name=(null) inode=25989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=9 name=(null) inode=25990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=10 name=(null) inode=25989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=11 name=(null) inode=25991 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=12 name=(null) inode=25989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=13 name=(null) inode=25992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=14 name=(null) inode=25989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=15 name=(null) inode=25993 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=16 name=(null) inode=25989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=17 name=(null) inode=25994 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=18 name=(null) inode=25986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=19 name=(null) inode=25995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=20 name=(null) inode=25995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=21 name=(null) inode=25996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=22 name=(null) inode=25995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=23 name=(null) inode=25997 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=24 name=(null) inode=25995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=25 name=(null) inode=25998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=26 name=(null) inode=25995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=27 name=(null) inode=25999 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=28 name=(null) inode=25995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=29 name=(null) inode=26000 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=30 name=(null) inode=25986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=31 name=(null) inode=26001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=32 name=(null) inode=26001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=33 name=(null) inode=26002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=34 name=(null) inode=26001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=35 name=(null) inode=26003 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=36 name=(null) inode=26001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=37 name=(null) inode=26004 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=38 name=(null) inode=26001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=39 name=(null) inode=26005 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=40 name=(null) inode=26001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PATH item=41 name=(null) inode=26006 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:04:21.857000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 20:04:21.955253 kernel: ipmi device interface Feb 9 20:04:21.960062 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 20:04:21.991267 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 20:04:21.991525 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 20:04:21.992230 kernel: ipmi_si: IPMI System Interface driver Feb 9 20:04:21.992262 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 20:04:21.993228 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 20:04:22.007230 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 20:04:22.007364 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 20:04:22.073252 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 20:04:22.073341 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 20:04:22.123712 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 20:04:22.123944 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 20:04:22.151661 systemd[1]: Started systemd-userdbd.service. Feb 9 20:04:22.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:22.183231 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 20:04:22.219381 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 20:04:22.219556 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 20:04:22.219573 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 20:04:22.282318 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 9 20:04:22.282499 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 9 20:04:22.286313 systemd-networkd[1304]: bond0: netdev ready Feb 9 20:04:22.289250 systemd-networkd[1304]: lo: Link UP Feb 9 20:04:22.289257 systemd-networkd[1304]: lo: Gained carrier Feb 9 20:04:22.289877 systemd-networkd[1304]: Enumeration completed Feb 9 20:04:22.289945 systemd[1]: Started systemd-networkd.service. Feb 9 20:04:22.290224 systemd-networkd[1304]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 20:04:22.293316 systemd-networkd[1304]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:79.network. Feb 9 20:04:22.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:22.304062 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 20:04:22.309224 kernel: intel_rapl_common: Found RAPL domain package Feb 9 20:04:22.309250 kernel: intel_rapl_common: Found RAPL domain core Feb 9 20:04:22.309263 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 20:04:22.375234 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 20:04:22.423227 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 9 20:04:22.564226 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 20:04:22.582225 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 20:04:22.585473 systemd[1]: Finished systemd-udev-settle.service. Feb 9 20:04:22.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:22.593962 systemd[1]: Starting lvm2-activation-early.service... Feb 9 20:04:22.611407 lvm[1378]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 20:04:22.639682 systemd[1]: Finished lvm2-activation-early.service. Feb 9 20:04:22.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:22.648352 systemd[1]: Reached target cryptsetup.target. Feb 9 20:04:22.656961 systemd[1]: Starting lvm2-activation.service... Feb 9 20:04:22.659422 lvm[1379]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 20:04:22.691644 systemd[1]: Finished lvm2-activation.service. Feb 9 20:04:22.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:22.700352 systemd[1]: Reached target local-fs-pre.target. Feb 9 20:04:22.708303 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 20:04:22.708318 systemd[1]: Reached target local-fs.target. Feb 9 20:04:22.716302 systemd[1]: Reached target machines.target. Feb 9 20:04:22.724832 systemd[1]: Starting ldconfig.service... Feb 9 20:04:22.732713 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 20:04:22.732738 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 20:04:22.733233 systemd[1]: Starting systemd-boot-update.service... Feb 9 20:04:22.740714 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 20:04:22.750783 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 20:04:22.750984 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 20:04:22.751012 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 20:04:22.751489 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 20:04:22.751668 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1381 (bootctl) Feb 9 20:04:22.752299 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 20:04:22.764624 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 20:04:22.764902 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 20:04:22.767570 systemd-tmpfiles[1385]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 20:04:22.771413 systemd-tmpfiles[1385]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 20:04:22.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:22.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:22.772733 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 20:04:22.775650 systemd-tmpfiles[1385]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 20:04:22.831153 systemd-fsck[1389]: fsck.fat 4.2 (2021-01-31) Feb 9 20:04:22.831153 systemd-fsck[1389]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 20:04:22.831861 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 20:04:22.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:22.847030 systemd[1]: Mounting boot.mount... Feb 9 20:04:22.856227 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 20:04:22.869281 systemd[1]: Mounted boot.mount. Feb 9 20:04:22.880255 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 9 20:04:22.881405 systemd-networkd[1304]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:78.network. Feb 9 20:04:22.897719 systemd[1]: Finished systemd-boot-update.service. Feb 9 20:04:22.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:22.928409 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 20:04:22.938267 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 20:04:22.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:04:22.947117 systemd[1]: Starting audit-rules.service... Feb 9 20:04:22.954922 systemd[1]: Starting clean-ca-certificates.service... Feb 9 20:04:22.963844 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 20:04:22.965000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 20:04:22.965000 audit[1409]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd3061a2a0 a2=420 a3=0 items=0 ppid=1392 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:04:22.965000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 20:04:22.967102 augenrules[1409]: No rules Feb 9 20:04:22.973171 systemd[1]: Starting systemd-resolved.service... Feb 9 20:04:22.981190 systemd[1]: Starting systemd-timesyncd.service... Feb 9 20:04:22.988751 systemd[1]: Starting systemd-update-utmp.service... Feb 9 20:04:22.996526 systemd[1]: Finished audit-rules.service. Feb 9 20:04:23.003391 systemd[1]: Finished clean-ca-certificates.service. Feb 9 20:04:23.012176 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 20:04:23.032807 systemd[1]: Finished systemd-update-utmp.service. Feb 9 20:04:23.053597 ldconfig[1380]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 20:04:23.059250 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 20:04:23.059665 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 20:04:23.079281 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 9 20:04:23.079329 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 20:04:23.113452 systemd[1]: Finished ldconfig.service. Feb 9 20:04:23.118934 systemd-networkd[1304]: bond0: Link UP Feb 9 20:04:23.119130 systemd-networkd[1304]: enp1s0f1np1: Link UP Feb 9 20:04:23.119248 systemd-networkd[1304]: enp1s0f1np1: Gained carrier Feb 9 20:04:23.120229 systemd-networkd[1304]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:5c:29:78.network. Feb 9 20:04:23.124993 systemd[1]: Starting systemd-update-done.service... Feb 9 20:04:23.140297 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 20:04:23.140462 systemd[1]: Finished systemd-update-done.service. Feb 9 20:04:23.149271 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 20:04:23.149300 kernel: bond0: active interface up! Feb 9 20:04:23.173764 systemd[1]: Started systemd-timesyncd.service. Feb 9 20:04:23.174986 systemd-resolved[1414]: Positive Trust Anchors: Feb 9 20:04:23.174994 systemd-resolved[1414]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 20:04:23.175013 systemd-resolved[1414]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 20:04:23.178654 systemd-resolved[1414]: Using system hostname 'ci-3510.3.2-a-1a2370b287'. Feb 9 20:04:23.190266 systemd[1]: Reached target time-set.target. Feb 9 20:04:23.203272 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 20:04:23.203302 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 20:04:23.274267 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 20:04:23.297255 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 20:04:23.320253 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 20:04:23.342255 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 20:04:23.364260 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 20:04:23.386285 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 20:04:23.408261 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 20:04:23.429244 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 20:04:23.429983 systemd-networkd[1304]: enp1s0f0np0: Link UP Feb 9 20:04:23.430292 systemd-networkd[1304]: bond0: Gained carrier Feb 9 20:04:23.430414 systemd-networkd[1304]: enp1s0f0np0: Gained carrier Feb 9 20:04:23.430421 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.431129 systemd[1]: Started systemd-resolved.service. Feb 9 20:04:23.449499 systemd[1]: Reached target network.target. Feb 9 20:04:23.452271 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 20:04:23.452318 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 9 20:04:23.476411 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.476441 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.484329 systemd[1]: Reached target nss-lookup.target. Feb 9 20:04:23.485795 systemd-networkd[1304]: enp1s0f1np1: Link DOWN Feb 9 20:04:23.485824 systemd-networkd[1304]: enp1s0f1np1: Lost carrier Feb 9 20:04:23.486283 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 20:04:23.495348 systemd[1]: Reached target sysinit.target. Feb 9 20:04:23.500399 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.500427 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.500561 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.504360 systemd[1]: Started motdgen.path. Feb 9 20:04:23.512347 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 20:04:23.523395 systemd[1]: Started logrotate.timer. Feb 9 20:04:23.531334 systemd[1]: Started mdadm.timer. Feb 9 20:04:23.538319 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 20:04:23.546321 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 20:04:23.546357 systemd[1]: Reached target paths.target. Feb 9 20:04:23.553288 systemd[1]: Reached target timers.target. Feb 9 20:04:23.560446 systemd[1]: Listening on dbus.socket. Feb 9 20:04:23.567869 systemd[1]: Starting docker.socket... Feb 9 20:04:23.575811 systemd[1]: Listening on sshd.socket. Feb 9 20:04:23.582379 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 20:04:23.582649 systemd[1]: Listening on docker.socket. Feb 9 20:04:23.589358 systemd[1]: Reached target sockets.target. Feb 9 20:04:23.597316 systemd[1]: Reached target basic.target. Feb 9 20:04:23.605418 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 20:04:23.605433 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 20:04:23.605877 systemd[1]: Starting containerd.service... Feb 9 20:04:23.612729 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 20:04:23.622726 systemd[1]: Starting coreos-metadata.service... Feb 9 20:04:23.636738 systemd[1]: Starting dbus.service... Feb 9 20:04:23.640146 coreos-metadata[1423]: Feb 09 20:04:23.640 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 20:04:23.641264 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 20:04:23.649521 coreos-metadata[1426]: Feb 09 20:04:23.649 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 20:04:23.652791 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 20:04:23.656842 jq[1432]: false Feb 9 20:04:23.660277 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Feb 9 20:04:23.662361 systemd-networkd[1304]: enp1s0f1np1: Link UP Feb 9 20:04:23.662478 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.662515 systemd-networkd[1304]: enp1s0f1np1: Gained carrier Feb 9 20:04:23.662532 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.666836 systemd[1]: Starting extend-filesystems.service... Feb 9 20:04:23.666861 dbus-daemon[1429]: [system] SELinux support is enabled Feb 9 20:04:23.673339 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 20:04:23.673891 systemd[1]: Starting motdgen.service... Feb 9 20:04:23.673964 extend-filesystems[1433]: Found sda Feb 9 20:04:23.673964 extend-filesystems[1433]: Found sda1 Feb 9 20:04:23.738217 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 9 20:04:23.738242 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 9 20:04:23.738254 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 20:04:23.681087 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 20:04:23.738312 extend-filesystems[1433]: Found sda2 Feb 9 20:04:23.738312 extend-filesystems[1433]: Found sda3 Feb 9 20:04:23.738312 extend-filesystems[1433]: Found usr Feb 9 20:04:23.738312 extend-filesystems[1433]: Found sda4 Feb 9 20:04:23.738312 extend-filesystems[1433]: Found sda6 Feb 9 20:04:23.738312 extend-filesystems[1433]: Found sda7 Feb 9 20:04:23.738312 extend-filesystems[1433]: Found sda9 Feb 9 20:04:23.738312 extend-filesystems[1433]: Checking size of /dev/sda9 Feb 9 20:04:23.738312 extend-filesystems[1433]: Resized partition /dev/sda9 Feb 9 20:04:23.683431 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.836410 extend-filesystems[1447]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 20:04:23.683479 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.683513 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:23.735303 systemd[1]: Starting sshd-keygen.service... Feb 9 20:04:23.851541 update_engine[1459]: I0209 20:04:23.840442 1459 main.cc:92] Flatcar Update Engine starting Feb 9 20:04:23.851541 update_engine[1459]: I0209 20:04:23.844053 1459 update_check_scheduler.cc:74] Next update check in 8m3s Feb 9 20:04:23.750673 systemd[1]: Starting systemd-logind.service... Feb 9 20:04:23.851714 jq[1460]: true Feb 9 20:04:23.772878 systemd-logind[1457]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 20:04:23.772887 systemd-logind[1457]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 20:04:23.772896 systemd-logind[1457]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 20:04:23.773031 systemd-logind[1457]: New seat seat0. Feb 9 20:04:23.776301 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 20:04:23.776896 systemd[1]: Starting tcsd.service... Feb 9 20:04:23.788521 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 20:04:23.788858 systemd[1]: Starting update-engine.service... Feb 9 20:04:23.806811 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 20:04:23.828600 systemd[1]: Started dbus.service. Feb 9 20:04:23.845242 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 20:04:23.845339 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 20:04:23.845481 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 20:04:23.845555 systemd[1]: Finished motdgen.service. Feb 9 20:04:23.858492 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 20:04:23.858573 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 20:04:23.868904 jq[1462]: true Feb 9 20:04:23.870156 dbus-daemon[1429]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 20:04:23.873327 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 20:04:23.873462 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 20:04:23.874450 systemd[1]: Started update-engine.service. Feb 9 20:04:23.877990 env[1463]: time="2024-02-09T20:04:23.877964564Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 20:04:23.886069 systemd[1]: Started systemd-logind.service. Feb 9 20:04:23.886459 env[1463]: time="2024-02-09T20:04:23.886443160Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 20:04:23.887531 env[1463]: time="2024-02-09T20:04:23.887521414Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 20:04:23.888134 env[1463]: time="2024-02-09T20:04:23.888120617Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 20:04:23.888157 env[1463]: time="2024-02-09T20:04:23.888135365Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 20:04:23.890058 env[1463]: time="2024-02-09T20:04:23.890045797Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 20:04:23.890094 env[1463]: time="2024-02-09T20:04:23.890058262Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 20:04:23.890094 env[1463]: time="2024-02-09T20:04:23.890066241Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 20:04:23.890094 env[1463]: time="2024-02-09T20:04:23.890074427Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 20:04:23.890166 env[1463]: time="2024-02-09T20:04:23.890116174Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 20:04:23.890246 env[1463]: time="2024-02-09T20:04:23.890236154Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 20:04:23.890308 env[1463]: time="2024-02-09T20:04:23.890298810Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 20:04:23.890338 env[1463]: time="2024-02-09T20:04:23.890308655Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 20:04:23.890338 env[1463]: time="2024-02-09T20:04:23.890334323Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 20:04:23.890380 env[1463]: time="2024-02-09T20:04:23.890341479Z" level=info msg="metadata content store policy set" policy=shared Feb 9 20:04:23.895868 systemd[1]: Started locksmithd.service. Feb 9 20:04:23.896630 bash[1489]: Updated "/home/core/.ssh/authorized_keys" Feb 9 20:04:23.901957 env[1463]: time="2024-02-09T20:04:23.901910873Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 20:04:23.901957 env[1463]: time="2024-02-09T20:04:23.901925182Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 20:04:23.901957 env[1463]: time="2024-02-09T20:04:23.901933006Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 20:04:23.901957 env[1463]: time="2024-02-09T20:04:23.901951711Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 20:04:23.902032 env[1463]: time="2024-02-09T20:04:23.901959858Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 20:04:23.902032 env[1463]: time="2024-02-09T20:04:23.901967522Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 20:04:23.902032 env[1463]: time="2024-02-09T20:04:23.901973959Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 20:04:23.902032 env[1463]: time="2024-02-09T20:04:23.901983762Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 20:04:23.902032 env[1463]: time="2024-02-09T20:04:23.901990828Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 20:04:23.902032 env[1463]: time="2024-02-09T20:04:23.902001094Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 20:04:23.902032 env[1463]: time="2024-02-09T20:04:23.902008222Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 20:04:23.902032 env[1463]: time="2024-02-09T20:04:23.902014570Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 20:04:23.902175 env[1463]: time="2024-02-09T20:04:23.902059209Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 20:04:23.902175 env[1463]: time="2024-02-09T20:04:23.902102254Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 20:04:23.902270 env[1463]: time="2024-02-09T20:04:23.902225461Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 20:04:23.902270 env[1463]: time="2024-02-09T20:04:23.902240355Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902270 env[1463]: time="2024-02-09T20:04:23.902247815Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 20:04:23.902341 env[1463]: time="2024-02-09T20:04:23.902274807Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902341 env[1463]: time="2024-02-09T20:04:23.902282809Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902341 env[1463]: time="2024-02-09T20:04:23.902289476Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902341 env[1463]: time="2024-02-09T20:04:23.902295307Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902341 env[1463]: time="2024-02-09T20:04:23.902301611Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902341 env[1463]: time="2024-02-09T20:04:23.902308152Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902341 env[1463]: time="2024-02-09T20:04:23.902314157Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902341 env[1463]: time="2024-02-09T20:04:23.902319927Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902341 env[1463]: time="2024-02-09T20:04:23.902327079Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 20:04:23.902473 env[1463]: time="2024-02-09T20:04:23.902388128Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902473 env[1463]: time="2024-02-09T20:04:23.902396778Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902473 env[1463]: time="2024-02-09T20:04:23.902403370Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902473 env[1463]: time="2024-02-09T20:04:23.902409553Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 20:04:23.902473 env[1463]: time="2024-02-09T20:04:23.902416598Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 20:04:23.902473 env[1463]: time="2024-02-09T20:04:23.902423071Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 20:04:23.902473 env[1463]: time="2024-02-09T20:04:23.902435261Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 20:04:23.902473 env[1463]: time="2024-02-09T20:04:23.902457465Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 20:04:23.902348 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 20:04:23.902435 systemd[1]: Reached target system-config.target. Feb 9 20:04:23.902648 env[1463]: time="2024-02-09T20:04:23.902564785Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 20:04:23.902648 env[1463]: time="2024-02-09T20:04:23.902595604Z" level=info msg="Connect containerd service" Feb 9 20:04:23.902648 env[1463]: time="2024-02-09T20:04:23.902611649Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 20:04:23.904615 env[1463]: time="2024-02-09T20:04:23.902879054Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 20:04:23.904615 env[1463]: time="2024-02-09T20:04:23.902964886Z" level=info msg="Start subscribing containerd event" Feb 9 20:04:23.904615 env[1463]: time="2024-02-09T20:04:23.902991429Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 20:04:23.904615 env[1463]: time="2024-02-09T20:04:23.903002908Z" level=info msg="Start recovering state" Feb 9 20:04:23.904615 env[1463]: time="2024-02-09T20:04:23.903013013Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 20:04:23.904615 env[1463]: time="2024-02-09T20:04:23.903034548Z" level=info msg="Start event monitor" Feb 9 20:04:23.904615 env[1463]: time="2024-02-09T20:04:23.903034531Z" level=info msg="containerd successfully booted in 0.025435s" Feb 9 20:04:23.904615 env[1463]: time="2024-02-09T20:04:23.903047148Z" level=info msg="Start snapshots syncer" Feb 9 20:04:23.904615 env[1463]: time="2024-02-09T20:04:23.903053605Z" level=info msg="Start cni network conf syncer for default" Feb 9 20:04:23.904615 env[1463]: time="2024-02-09T20:04:23.903058368Z" level=info msg="Start streaming server" Feb 9 20:04:23.910324 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 20:04:23.910441 systemd[1]: Reached target user-config.target. Feb 9 20:04:23.919846 systemd[1]: Started containerd.service. Feb 9 20:04:23.926473 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 20:04:23.953786 locksmithd[1497]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 20:04:24.172386 sshd_keygen[1456]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 20:04:24.184370 systemd[1]: Finished sshd-keygen.service. Feb 9 20:04:24.193168 systemd[1]: Starting issuegen.service... Feb 9 20:04:24.201478 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 20:04:24.201546 systemd[1]: Finished issuegen.service. Feb 9 20:04:24.210037 systemd[1]: Starting systemd-user-sessions.service... Feb 9 20:04:24.223116 systemd[1]: Finished systemd-user-sessions.service. Feb 9 20:04:24.233264 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 9 20:04:24.242011 systemd[1]: Started getty@tty1.service. Feb 9 20:04:24.250122 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 20:04:24.259364 systemd[1]: Reached target getty.target. Feb 9 20:04:24.261510 extend-filesystems[1447]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 20:04:24.261510 extend-filesystems[1447]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 20:04:24.261510 extend-filesystems[1447]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 9 20:04:24.303420 extend-filesystems[1433]: Resized filesystem in /dev/sda9 Feb 9 20:04:24.303420 extend-filesystems[1433]: Found sdb Feb 9 20:04:24.266575 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 20:04:24.266667 systemd[1]: Finished extend-filesystems.service. Feb 9 20:04:24.661295 systemd-networkd[1304]: bond0: Gained IPv6LL Feb 9 20:04:24.661514 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:25.429541 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:25.429620 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:25.430474 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 20:04:25.440443 systemd[1]: Reached target network-online.target. Feb 9 20:04:25.798275 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 20:04:25.906297 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:1 Feb 9 20:04:25.942257 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 9 20:04:29.271669 login[1519]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 20:04:29.278850 login[1518]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 20:04:29.279487 systemd[1]: Created slice user-500.slice. Feb 9 20:04:29.280107 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 20:04:29.281021 systemd-logind[1457]: New session 1 of user core. Feb 9 20:04:29.282587 systemd-logind[1457]: New session 2 of user core. Feb 9 20:04:29.285081 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 20:04:29.285876 systemd[1]: Starting user@500.service... Feb 9 20:04:29.287743 (systemd)[1524]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:04:29.352834 systemd[1524]: Queued start job for default target default.target. Feb 9 20:04:29.353053 systemd[1524]: Reached target paths.target. Feb 9 20:04:29.353064 systemd[1524]: Reached target sockets.target. Feb 9 20:04:29.353071 systemd[1524]: Reached target timers.target. Feb 9 20:04:29.353078 systemd[1524]: Reached target basic.target. Feb 9 20:04:29.353095 systemd[1524]: Reached target default.target. Feb 9 20:04:29.353108 systemd[1524]: Startup finished in 62ms. Feb 9 20:04:29.353160 systemd[1]: Started user@500.service. Feb 9 20:04:29.353733 systemd[1]: Started session-1.scope. Feb 9 20:04:29.354077 systemd[1]: Started session-2.scope. Feb 9 20:04:31.236277 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 9 20:04:31.236443 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 9 20:04:31.444665 coreos-metadata[1423]: Feb 09 20:04:31.444 INFO Fetch successful Feb 9 20:04:31.445622 coreos-metadata[1426]: Feb 09 20:04:31.445 INFO Fetch successful Feb 9 20:04:31.467120 unknown[1423]: wrote ssh authorized keys file for user: core Feb 9 20:04:31.467237 systemd[1]: Finished coreos-metadata.service. Feb 9 20:04:31.468145 systemd[1]: Starting etcd-member.service... Feb 9 20:04:31.468767 systemd[1]: Started packet-phone-home.service. Feb 9 20:04:31.474589 curl[1547]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 20:04:31.474757 curl[1547]: Dload Upload Total Spent Left Speed Feb 9 20:04:31.477864 update-ssh-keys[1548]: Updated "/home/core/.ssh/authorized_keys" Feb 9 20:04:31.478123 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 20:04:31.483639 systemd[1]: Starting docker.service... Feb 9 20:04:31.500586 env[1562]: time="2024-02-09T20:04:31.500501067Z" level=info msg="Starting up" Feb 9 20:04:31.501152 env[1562]: time="2024-02-09T20:04:31.501113583Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 20:04:31.501152 env[1562]: time="2024-02-09T20:04:31.501123179Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 20:04:31.501152 env[1562]: time="2024-02-09T20:04:31.501134258Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 20:04:31.501152 env[1562]: time="2024-02-09T20:04:31.501140060Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 20:04:31.501922 env[1562]: time="2024-02-09T20:04:31.501907271Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 20:04:31.501922 env[1562]: time="2024-02-09T20:04:31.501915815Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 20:04:31.501970 env[1562]: time="2024-02-09T20:04:31.501923511Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 20:04:31.501970 env[1562]: time="2024-02-09T20:04:31.501928870Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 20:04:31.515717 env[1562]: time="2024-02-09T20:04:31.515668637Z" level=info msg="Loading containers: start." Feb 9 20:04:31.604237 kernel: Initializing XFRM netlink socket Feb 9 20:04:31.659026 env[1562]: time="2024-02-09T20:04:31.658984448Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 20:04:31.659701 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:31.659776 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:31.662712 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:31.662835 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:31.701573 systemd-networkd[1304]: docker0: Link UP Feb 9 20:04:31.701704 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:04:31.706564 env[1562]: time="2024-02-09T20:04:31.706519802Z" level=info msg="Loading containers: done." Feb 9 20:04:31.712748 env[1562]: time="2024-02-09T20:04:31.712700590Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 20:04:31.712842 env[1562]: time="2024-02-09T20:04:31.712805218Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 20:04:31.712876 env[1562]: time="2024-02-09T20:04:31.712866094Z" level=info msg="Daemon has completed initialization" Feb 9 20:04:31.721276 systemd[1]: Started docker.service. Feb 9 20:04:31.725804 env[1562]: time="2024-02-09T20:04:31.725743689Z" level=info msg="API listen on /run/docker.sock" Feb 9 20:04:31.726503 etcd-wrapper[1552]: Error response from daemon: No such container: etcd-member Feb 9 20:04:31.743452 etcd-wrapper[1690]: Error: No such container: etcd-member Feb 9 20:04:31.781565 etcd-wrapper[1711]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 9 20:04:32.102558 curl[1547]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 20:04:32.104980 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 20:04:32.897058 systemd[1]: Created slice system-sshd.slice. Feb 9 20:04:32.897713 systemd[1]: Started sshd@0-147.75.49.127:22-139.178.89.65:41524.service. Feb 9 20:04:32.939112 sshd[1727]: Accepted publickey for core from 139.178.89.65 port 41524 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:04:32.940230 sshd[1727]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:04:32.944229 systemd-logind[1457]: New session 3 of user core. Feb 9 20:04:32.945257 systemd[1]: Started session-3.scope. Feb 9 20:04:33.001774 systemd[1]: Started sshd@1-147.75.49.127:22-139.178.89.65:41526.service. Feb 9 20:04:33.003518 etcd-wrapper[1711]: v3.5.0: Pulling from coreos/etcd Feb 9 20:04:33.031675 sshd[1732]: Accepted publickey for core from 139.178.89.65 port 41526 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:04:33.032378 sshd[1732]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:04:33.034592 systemd-logind[1457]: New session 4 of user core. Feb 9 20:04:33.035059 systemd[1]: Started session-4.scope. Feb 9 20:04:33.085332 sshd[1732]: pam_unix(sshd:session): session closed for user core Feb 9 20:04:33.087423 systemd[1]: sshd@1-147.75.49.127:22-139.178.89.65:41526.service: Deactivated successfully. Feb 9 20:04:33.087932 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 20:04:33.088442 systemd-logind[1457]: Session 4 logged out. Waiting for processes to exit. Feb 9 20:04:33.089238 systemd[1]: Started sshd@2-147.75.49.127:22-139.178.89.65:41530.service. Feb 9 20:04:33.089923 systemd-logind[1457]: Removed session 4. Feb 9 20:04:33.121281 sshd[1738]: Accepted publickey for core from 139.178.89.65 port 41530 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:04:33.122137 sshd[1738]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:04:33.125046 systemd-logind[1457]: New session 5 of user core. Feb 9 20:04:33.125678 systemd[1]: Started session-5.scope. Feb 9 20:04:33.191027 sshd[1738]: pam_unix(sshd:session): session closed for user core Feb 9 20:04:33.196886 systemd[1]: sshd@2-147.75.49.127:22-139.178.89.65:41530.service: Deactivated successfully. Feb 9 20:04:33.198674 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 20:04:33.200396 systemd-logind[1457]: Session 5 logged out. Waiting for processes to exit. Feb 9 20:04:33.202658 systemd-logind[1457]: Removed session 5. Feb 9 20:04:33.299929 etcd-wrapper[1711]: 1813d21adc01: Pulling fs layer Feb 9 20:04:33.299929 etcd-wrapper[1711]: 6e96907ab677: Pulling fs layer Feb 9 20:04:33.300443 etcd-wrapper[1711]: 444ed0ea8673: Pulling fs layer Feb 9 20:04:33.300443 etcd-wrapper[1711]: 0fd2df5633f0: Pulling fs layer Feb 9 20:04:33.300443 etcd-wrapper[1711]: 8cc22b9456bb: Pulling fs layer Feb 9 20:04:33.300443 etcd-wrapper[1711]: 7ac70aecd290: Pulling fs layer Feb 9 20:04:33.300443 etcd-wrapper[1711]: 4b376c64dfe4: Pulling fs layer Feb 9 20:04:33.300443 etcd-wrapper[1711]: 8cc22b9456bb: Waiting Feb 9 20:04:33.678356 etcd-wrapper[1711]: 444ed0ea8673: Verifying Checksum Feb 9 20:04:33.678356 etcd-wrapper[1711]: 444ed0ea8673: Download complete Feb 9 20:04:33.753444 etcd-wrapper[1711]: 6e96907ab677: Verifying Checksum Feb 9 20:04:33.753791 etcd-wrapper[1711]: 6e96907ab677: Download complete Feb 9 20:04:33.934890 etcd-wrapper[1711]: 1813d21adc01: Verifying Checksum Feb 9 20:04:33.934890 etcd-wrapper[1711]: 1813d21adc01: Download complete Feb 9 20:04:33.994237 etcd-wrapper[1711]: 0fd2df5633f0: Verifying Checksum Feb 9 20:04:33.994237 etcd-wrapper[1711]: 0fd2df5633f0: Download complete Feb 9 20:04:34.055268 etcd-wrapper[1711]: 8cc22b9456bb: Verifying Checksum Feb 9 20:04:34.055268 etcd-wrapper[1711]: 8cc22b9456bb: Download complete Feb 9 20:04:34.244136 etcd-wrapper[1711]: 7ac70aecd290: Verifying Checksum Feb 9 20:04:34.244136 etcd-wrapper[1711]: 7ac70aecd290: Download complete Feb 9 20:04:34.283989 etcd-wrapper[1711]: 4b376c64dfe4: Verifying Checksum Feb 9 20:04:34.283989 etcd-wrapper[1711]: 4b376c64dfe4: Download complete Feb 9 20:04:34.422095 etcd-wrapper[1711]: 1813d21adc01: Pull complete Feb 9 20:04:34.647411 systemd[1]: var-lib-docker-overlay2-fb02605ef1f72d5697b023dbe1566bce067f390e0a67e056ecd474aa962c7319-merged.mount: Deactivated successfully. Feb 9 20:04:34.885083 etcd-wrapper[1711]: 6e96907ab677: Pull complete Feb 9 20:04:35.043345 systemd[1]: var-lib-docker-overlay2-2786067f0b2f43acf9930fada4241233b886a0b1e13cb7df5a4df42d7a188ca8-merged.mount: Deactivated successfully. Feb 9 20:04:35.086354 etcd-wrapper[1711]: 444ed0ea8673: Pull complete Feb 9 20:04:35.264292 etcd-wrapper[1711]: 0fd2df5633f0: Pull complete Feb 9 20:04:35.294393 etcd-wrapper[1711]: 8cc22b9456bb: Pull complete Feb 9 20:04:35.328414 etcd-wrapper[1711]: 7ac70aecd290: Pull complete Feb 9 20:04:35.351234 etcd-wrapper[1711]: 4b376c64dfe4: Pull complete Feb 9 20:04:35.353765 etcd-wrapper[1711]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 9 20:04:35.354656 etcd-wrapper[1711]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 9 20:04:35.427913 env[1463]: time="2024-02-09T20:04:35.427852207Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 20:04:35.427913 env[1463]: time="2024-02-09T20:04:35.427885871Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 20:04:35.427913 env[1463]: time="2024-02-09T20:04:35.427898909Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 20:04:35.428346 env[1463]: time="2024-02-09T20:04:35.428045804Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/d010664f5f537db6cd131bd10b6b40f5b8e460a4f4e0b8273de6edeca57e172e pid=1906 runtime=io.containerd.runc.v2 Feb 9 20:04:35.428646 systemd[1]: var-lib-docker-overlay2-6b1f61442794b1f4a36f00080a0c6e410df4dfedb2ae3f905311f171e1c34c8e-merged.mount: Deactivated successfully. Feb 9 20:04:35.458299 systemd[1]: Started docker-d010664f5f537db6cd131bd10b6b40f5b8e460a4f4e0b8273de6edeca57e172e.scope. Feb 9 20:04:35.547055 etcd-wrapper[1711]: {"level":"info","ts":1707509075.5468156,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 9 20:04:35.547055 etcd-wrapper[1711]: {"level":"info","ts":1707509075.5468655,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"09d486f734094cc7951ce5f46efc35aa"} Feb 9 20:04:35.547055 etcd-wrapper[1711]: {"level":"warn","ts":1707509075.5468874,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 9 20:04:35.547055 etcd-wrapper[1711]: {"level":"warn","ts":1707509075.5468938,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 9 20:04:35.547055 etcd-wrapper[1711]: {"level":"warn","ts":1707509075.5468986,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 9 20:04:35.547055 etcd-wrapper[1711]: {"level":"warn","ts":1707509075.546903,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 9 20:04:35.547055 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:04:35.546Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.13:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.13:2380","--advertise-client-urls=http://10.67.80.13:2379","--discovery=https://discovery.etcd.io/c738a367752bbd53075ebdf33f23a00c"]} Feb 9 20:04:35.547055 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:04:35.546Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.13:2380"]} Feb 9 20:04:35.547438 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:04:35.547Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 9 20:04:35.547438 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:04:35.547Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"09d486f734094cc7951ce5f46efc35aa","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.13:2380"],"listen-peer-urls":["http://10.67.80.13:2380"],"advertise-client-urls":["http://10.67.80.13:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"09d486f734094cc7951ce5f46efc35aa=http://10.67.80.13:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/c738a367752bbd53075ebdf33f23a00c","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/c738a367752bbd53075ebdf33f23a00c","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 9 20:04:35.548057 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:04:35.547Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"514.818µs"} Feb 9 20:04:36.048861 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:04:36.048Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"13cbf5418b8b7270"} Feb 9 20:04:36.048861 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:04:36.048Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":1,"needed-peers":2} Feb 9 20:04:43.200004 systemd[1]: Started sshd@3-147.75.49.127:22-139.178.89.65:56782.service. Feb 9 20:04:43.229915 sshd[1956]: Accepted publickey for core from 139.178.89.65 port 56782 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:04:43.230793 sshd[1956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:04:43.233897 systemd-logind[1457]: New session 6 of user core. Feb 9 20:04:43.234563 systemd[1]: Started session-6.scope. Feb 9 20:04:43.289499 sshd[1956]: pam_unix(sshd:session): session closed for user core Feb 9 20:04:43.291031 systemd[1]: sshd@3-147.75.49.127:22-139.178.89.65:56782.service: Deactivated successfully. Feb 9 20:04:43.291375 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 20:04:43.291695 systemd-logind[1457]: Session 6 logged out. Waiting for processes to exit. Feb 9 20:04:43.292163 systemd[1]: Started sshd@4-147.75.49.127:22-139.178.89.65:56784.service. Feb 9 20:04:43.292608 systemd-logind[1457]: Removed session 6. Feb 9 20:04:43.322146 sshd[1962]: Accepted publickey for core from 139.178.89.65 port 56784 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:04:43.323084 sshd[1962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:04:43.326490 systemd-logind[1457]: New session 7 of user core. Feb 9 20:04:43.327192 systemd[1]: Started session-7.scope. Feb 9 20:04:43.383323 sshd[1962]: pam_unix(sshd:session): session closed for user core Feb 9 20:04:43.384646 systemd[1]: sshd@4-147.75.49.127:22-139.178.89.65:56784.service: Deactivated successfully. Feb 9 20:04:43.385037 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 20:04:43.385429 systemd-logind[1457]: Session 7 logged out. Waiting for processes to exit. Feb 9 20:04:43.386010 systemd-logind[1457]: Removed session 7. Feb 9 20:04:53.392943 systemd[1]: Started sshd@5-147.75.49.127:22-139.178.89.65:47544.service. Feb 9 20:04:53.422635 sshd[1969]: Accepted publickey for core from 139.178.89.65 port 47544 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:04:53.423517 sshd[1969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:04:53.426548 systemd-logind[1457]: New session 8 of user core. Feb 9 20:04:53.427255 systemd[1]: Started session-8.scope. Feb 9 20:04:53.481402 sshd[1969]: pam_unix(sshd:session): session closed for user core Feb 9 20:04:53.482860 systemd[1]: sshd@5-147.75.49.127:22-139.178.89.65:47544.service: Deactivated successfully. Feb 9 20:04:53.483150 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 20:04:53.483590 systemd-logind[1457]: Session 8 logged out. Waiting for processes to exit. Feb 9 20:04:53.484035 systemd[1]: Started sshd@6-147.75.49.127:22-139.178.89.65:47560.service. Feb 9 20:04:53.484500 systemd-logind[1457]: Removed session 8. Feb 9 20:04:53.514052 sshd[1975]: Accepted publickey for core from 139.178.89.65 port 47560 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:04:53.514924 sshd[1975]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:04:53.517958 systemd-logind[1457]: New session 9 of user core. Feb 9 20:04:53.518654 systemd[1]: Started session-9.scope. Feb 9 20:04:53.574541 sshd[1975]: pam_unix(sshd:session): session closed for user core Feb 9 20:04:53.575795 systemd[1]: sshd@6-147.75.49.127:22-139.178.89.65:47560.service: Deactivated successfully. Feb 9 20:04:53.576185 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 20:04:53.576598 systemd-logind[1457]: Session 9 logged out. Waiting for processes to exit. Feb 9 20:04:53.577134 systemd-logind[1457]: Removed session 9. Feb 9 20:05:02.543764 systemd-resolved[1414]: Clock change detected. Flushing caches. Feb 9 20:05:02.543992 systemd-timesyncd[1415]: Contacted time server [2603:c020:6:b900:ed2f:b442:fee7:d9b9]:123 (2.flatcar.pool.ntp.org). Feb 9 20:05:02.544126 systemd-timesyncd[1415]: Initial clock synchronization to Fri 2024-02-09 20:05:02.543591 UTC. Feb 9 20:05:04.074604 systemd[1]: Started sshd@7-147.75.49.127:22-139.178.89.65:47204.service. Feb 9 20:05:04.104757 sshd[1981]: Accepted publickey for core from 139.178.89.65 port 47204 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:04.105641 sshd[1981]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:04.108681 systemd-logind[1457]: New session 10 of user core. Feb 9 20:05:04.109350 systemd[1]: Started session-10.scope. Feb 9 20:05:04.164198 sshd[1981]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:04.165601 systemd[1]: sshd@7-147.75.49.127:22-139.178.89.65:47204.service: Deactivated successfully. Feb 9 20:05:04.165903 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 20:05:04.166297 systemd-logind[1457]: Session 10 logged out. Waiting for processes to exit. Feb 9 20:05:04.166777 systemd[1]: Started sshd@8-147.75.49.127:22-139.178.89.65:47206.service. Feb 9 20:05:04.167224 systemd-logind[1457]: Removed session 10. Feb 9 20:05:04.196861 sshd[1987]: Accepted publickey for core from 139.178.89.65 port 47206 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:04.197782 sshd[1987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:04.201145 systemd-logind[1457]: New session 11 of user core. Feb 9 20:05:04.201809 systemd[1]: Started session-11.scope. Feb 9 20:05:04.267816 sshd[1987]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:04.273450 systemd[1]: sshd@8-147.75.49.127:22-139.178.89.65:47206.service: Deactivated successfully. Feb 9 20:05:04.275130 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 20:05:04.276821 systemd-logind[1457]: Session 11 logged out. Waiting for processes to exit. Feb 9 20:05:04.279076 systemd-logind[1457]: Removed session 11. Feb 9 20:05:10.080732 update_engine[1459]: I0209 20:05:10.080608 1459 update_attempter.cc:509] Updating boot flags... Feb 9 20:05:14.276322 systemd[1]: Started sshd@9-147.75.49.127:22-139.178.89.65:56374.service. Feb 9 20:05:14.306597 sshd[2015]: Accepted publickey for core from 139.178.89.65 port 56374 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:14.307478 sshd[2015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:14.310788 systemd-logind[1457]: New session 12 of user core. Feb 9 20:05:14.311447 systemd[1]: Started session-12.scope. Feb 9 20:05:14.367083 sshd[2015]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:14.368556 systemd[1]: sshd@9-147.75.49.127:22-139.178.89.65:56374.service: Deactivated successfully. Feb 9 20:05:14.368868 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 20:05:14.369273 systemd-logind[1457]: Session 12 logged out. Waiting for processes to exit. Feb 9 20:05:14.369722 systemd[1]: Started sshd@10-147.75.49.127:22-139.178.89.65:56390.service. Feb 9 20:05:14.370097 systemd-logind[1457]: Removed session 12. Feb 9 20:05:14.399788 sshd[2021]: Accepted publickey for core from 139.178.89.65 port 56390 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:14.400798 sshd[2021]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:14.404396 systemd-logind[1457]: New session 13 of user core. Feb 9 20:05:14.405231 systemd[1]: Started session-13.scope. Feb 9 20:05:14.461086 sshd[2021]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:14.462354 systemd[1]: sshd@10-147.75.49.127:22-139.178.89.65:56390.service: Deactivated successfully. Feb 9 20:05:14.462719 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 20:05:14.463118 systemd-logind[1457]: Session 13 logged out. Waiting for processes to exit. Feb 9 20:05:14.463682 systemd-logind[1457]: Removed session 13. Feb 9 20:05:24.470155 systemd[1]: Started sshd@11-147.75.49.127:22-139.178.89.65:45320.service. Feb 9 20:05:24.500229 sshd[2027]: Accepted publickey for core from 139.178.89.65 port 45320 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:24.501168 sshd[2027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:24.504326 systemd-logind[1457]: New session 14 of user core. Feb 9 20:05:24.504992 systemd[1]: Started session-14.scope. Feb 9 20:05:24.559663 sshd[2027]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:24.561083 systemd[1]: sshd@11-147.75.49.127:22-139.178.89.65:45320.service: Deactivated successfully. Feb 9 20:05:24.561384 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 20:05:24.561685 systemd-logind[1457]: Session 14 logged out. Waiting for processes to exit. Feb 9 20:05:24.562219 systemd[1]: Started sshd@12-147.75.49.127:22-139.178.89.65:45322.service. Feb 9 20:05:24.562710 systemd-logind[1457]: Removed session 14. Feb 9 20:05:24.592676 sshd[2033]: Accepted publickey for core from 139.178.89.65 port 45322 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:24.593678 sshd[2033]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:24.597313 systemd-logind[1457]: New session 15 of user core. Feb 9 20:05:24.598108 systemd[1]: Started session-15.scope. Feb 9 20:05:24.654303 sshd[2033]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:24.655519 systemd[1]: sshd@12-147.75.49.127:22-139.178.89.65:45322.service: Deactivated successfully. Feb 9 20:05:24.655907 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 20:05:24.656313 systemd-logind[1457]: Session 15 logged out. Waiting for processes to exit. Feb 9 20:05:24.656815 systemd-logind[1457]: Removed session 15. Feb 9 20:05:34.664477 systemd[1]: Started sshd@13-147.75.49.127:22-139.178.89.65:60624.service. Feb 9 20:05:34.693887 sshd[2040]: Accepted publickey for core from 139.178.89.65 port 60624 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:34.694767 sshd[2040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:34.697850 systemd-logind[1457]: New session 16 of user core. Feb 9 20:05:34.698543 systemd[1]: Started session-16.scope. Feb 9 20:05:34.763722 sshd[2040]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:34.770468 systemd[1]: sshd@13-147.75.49.127:22-139.178.89.65:60624.service: Deactivated successfully. Feb 9 20:05:34.772072 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 20:05:34.773766 systemd-logind[1457]: Session 16 logged out. Waiting for processes to exit. Feb 9 20:05:34.776390 systemd[1]: Started sshd@14-147.75.49.127:22-139.178.89.65:60634.service. Feb 9 20:05:34.778903 systemd-logind[1457]: Removed session 16. Feb 9 20:05:34.809982 sshd[2046]: Accepted publickey for core from 139.178.89.65 port 60634 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:34.810758 sshd[2046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:34.813540 systemd-logind[1457]: New session 17 of user core. Feb 9 20:05:34.814067 systemd[1]: Started session-17.scope. Feb 9 20:05:34.868486 sshd[2046]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:34.869747 systemd[1]: sshd@14-147.75.49.127:22-139.178.89.65:60634.service: Deactivated successfully. Feb 9 20:05:34.870175 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 20:05:34.870590 systemd-logind[1457]: Session 17 logged out. Waiting for processes to exit. Feb 9 20:05:34.871151 systemd-logind[1457]: Removed session 17. Feb 9 20:05:44.877775 systemd[1]: Started sshd@15-147.75.49.127:22-139.178.89.65:52418.service. Feb 9 20:05:44.907982 sshd[2052]: Accepted publickey for core from 139.178.89.65 port 52418 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:44.908889 sshd[2052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:44.912126 systemd-logind[1457]: New session 18 of user core. Feb 9 20:05:44.912825 systemd[1]: Started session-18.scope. Feb 9 20:05:44.968399 sshd[2052]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:44.969816 systemd[1]: sshd@15-147.75.49.127:22-139.178.89.65:52418.service: Deactivated successfully. Feb 9 20:05:44.970173 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 20:05:44.970576 systemd-logind[1457]: Session 18 logged out. Waiting for processes to exit. Feb 9 20:05:44.971069 systemd[1]: Started sshd@16-147.75.49.127:22-139.178.89.65:52434.service. Feb 9 20:05:44.971564 systemd-logind[1457]: Removed session 18. Feb 9 20:05:45.000980 sshd[2058]: Accepted publickey for core from 139.178.89.65 port 52434 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:45.001992 sshd[2058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:45.005480 systemd-logind[1457]: New session 19 of user core. Feb 9 20:05:45.006269 systemd[1]: Started session-19.scope. Feb 9 20:05:45.062507 sshd[2058]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:45.063785 systemd[1]: sshd@16-147.75.49.127:22-139.178.89.65:52434.service: Deactivated successfully. Feb 9 20:05:45.064179 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 20:05:45.064546 systemd-logind[1457]: Session 19 logged out. Waiting for processes to exit. Feb 9 20:05:45.065083 systemd-logind[1457]: Removed session 19. Feb 9 20:05:55.071647 systemd[1]: Started sshd@17-147.75.49.127:22-139.178.89.65:34542.service. Feb 9 20:05:55.101701 sshd[2064]: Accepted publickey for core from 139.178.89.65 port 34542 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:55.102573 sshd[2064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:55.105707 systemd-logind[1457]: New session 20 of user core. Feb 9 20:05:55.106363 systemd[1]: Started session-20.scope. Feb 9 20:05:55.161336 sshd[2064]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:55.162782 systemd[1]: sshd@17-147.75.49.127:22-139.178.89.65:34542.service: Deactivated successfully. Feb 9 20:05:55.163127 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 20:05:55.163522 systemd-logind[1457]: Session 20 logged out. Waiting for processes to exit. Feb 9 20:05:55.164014 systemd[1]: Started sshd@18-147.75.49.127:22-139.178.89.65:34554.service. Feb 9 20:05:55.164559 systemd-logind[1457]: Removed session 20. Feb 9 20:05:55.194326 sshd[2070]: Accepted publickey for core from 139.178.89.65 port 34554 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:05:55.195197 sshd[2070]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:05:55.198215 systemd-logind[1457]: New session 21 of user core. Feb 9 20:05:55.198832 systemd[1]: Started session-21.scope. Feb 9 20:05:55.254441 sshd[2070]: pam_unix(sshd:session): session closed for user core Feb 9 20:05:55.255669 systemd[1]: sshd@18-147.75.49.127:22-139.178.89.65:34554.service: Deactivated successfully. Feb 9 20:05:55.256059 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 20:05:55.256463 systemd-logind[1457]: Session 21 logged out. Waiting for processes to exit. Feb 9 20:05:55.256887 systemd-logind[1457]: Removed session 21. Feb 9 20:06:05.264459 systemd[1]: Started sshd@19-147.75.49.127:22-139.178.89.65:38018.service. Feb 9 20:06:05.293977 sshd[2076]: Accepted publickey for core from 139.178.89.65 port 38018 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:05.294837 sshd[2076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:05.297746 systemd-logind[1457]: New session 22 of user core. Feb 9 20:06:05.298386 systemd[1]: Started session-22.scope. Feb 9 20:06:05.352336 sshd[2076]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:05.353898 systemd[1]: sshd@19-147.75.49.127:22-139.178.89.65:38018.service: Deactivated successfully. Feb 9 20:06:05.354239 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 20:06:05.354613 systemd-logind[1457]: Session 22 logged out. Waiting for processes to exit. Feb 9 20:06:05.355114 systemd[1]: Started sshd@20-147.75.49.127:22-139.178.89.65:38022.service. Feb 9 20:06:05.355604 systemd-logind[1457]: Removed session 22. Feb 9 20:06:05.385193 sshd[2082]: Accepted publickey for core from 139.178.89.65 port 38022 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:05.386044 sshd[2082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:05.389007 systemd-logind[1457]: New session 23 of user core. Feb 9 20:06:05.389712 systemd[1]: Started session-23.scope. Feb 9 20:06:05.444580 sshd[2082]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:05.445823 systemd[1]: sshd@20-147.75.49.127:22-139.178.89.65:38022.service: Deactivated successfully. Feb 9 20:06:05.446206 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 20:06:05.446588 systemd-logind[1457]: Session 23 logged out. Waiting for processes to exit. Feb 9 20:06:05.447139 systemd-logind[1457]: Removed session 23. Feb 9 20:06:15.453559 systemd[1]: Started sshd@21-147.75.49.127:22-139.178.89.65:49278.service. Feb 9 20:06:15.483228 sshd[2089]: Accepted publickey for core from 139.178.89.65 port 49278 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:15.484107 sshd[2089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:15.487240 systemd-logind[1457]: New session 24 of user core. Feb 9 20:06:15.487936 systemd[1]: Started session-24.scope. Feb 9 20:06:15.543145 sshd[2089]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:15.544767 systemd[1]: sshd@21-147.75.49.127:22-139.178.89.65:49278.service: Deactivated successfully. Feb 9 20:06:15.545133 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 20:06:15.545500 systemd-logind[1457]: Session 24 logged out. Waiting for processes to exit. Feb 9 20:06:15.546020 systemd[1]: Started sshd@22-147.75.49.127:22-139.178.89.65:49290.service. Feb 9 20:06:15.546540 systemd-logind[1457]: Removed session 24. Feb 9 20:06:15.575763 sshd[2095]: Accepted publickey for core from 139.178.89.65 port 49290 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:15.576653 sshd[2095]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:15.579849 systemd-logind[1457]: New session 25 of user core. Feb 9 20:06:15.580520 systemd[1]: Started session-25.scope. Feb 9 20:06:15.637070 sshd[2095]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:15.638288 systemd[1]: sshd@22-147.75.49.127:22-139.178.89.65:49290.service: Deactivated successfully. Feb 9 20:06:15.638673 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 20:06:15.639014 systemd-logind[1457]: Session 25 logged out. Waiting for processes to exit. Feb 9 20:06:15.639624 systemd-logind[1457]: Removed session 25. Feb 9 20:06:25.646628 systemd[1]: Started sshd@23-147.75.49.127:22-139.178.89.65:34206.service. Feb 9 20:06:25.676329 sshd[2101]: Accepted publickey for core from 139.178.89.65 port 34206 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:25.677204 sshd[2101]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:25.680269 systemd-logind[1457]: New session 26 of user core. Feb 9 20:06:25.680964 systemd[1]: Started session-26.scope. Feb 9 20:06:25.736169 sshd[2101]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:25.737841 systemd[1]: sshd@23-147.75.49.127:22-139.178.89.65:34206.service: Deactivated successfully. Feb 9 20:06:25.738173 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 20:06:25.738526 systemd-logind[1457]: Session 26 logged out. Waiting for processes to exit. Feb 9 20:06:25.739127 systemd[1]: Started sshd@24-147.75.49.127:22-139.178.89.65:34216.service. Feb 9 20:06:25.739558 systemd-logind[1457]: Removed session 26. Feb 9 20:06:25.768988 sshd[2107]: Accepted publickey for core from 139.178.89.65 port 34216 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:25.769877 sshd[2107]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:25.772994 systemd-logind[1457]: New session 27 of user core. Feb 9 20:06:25.773708 systemd[1]: Started session-27.scope. Feb 9 20:06:25.829799 sshd[2107]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:25.830991 systemd[1]: sshd@24-147.75.49.127:22-139.178.89.65:34216.service: Deactivated successfully. Feb 9 20:06:25.831370 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 20:06:25.831708 systemd-logind[1457]: Session 27 logged out. Waiting for processes to exit. Feb 9 20:06:25.832277 systemd-logind[1457]: Removed session 27. Feb 9 20:06:35.839092 systemd[1]: Started sshd@25-147.75.49.127:22-139.178.89.65:56852.service. Feb 9 20:06:35.868977 sshd[2113]: Accepted publickey for core from 139.178.89.65 port 56852 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:35.869896 sshd[2113]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:35.872965 systemd-logind[1457]: New session 28 of user core. Feb 9 20:06:35.873675 systemd[1]: Started session-28.scope. Feb 9 20:06:35.941266 sshd[2113]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:35.947752 systemd[1]: sshd@25-147.75.49.127:22-139.178.89.65:56852.service: Deactivated successfully. Feb 9 20:06:35.948789 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 20:06:35.949286 systemd-logind[1457]: Session 28 logged out. Waiting for processes to exit. Feb 9 20:06:35.949786 systemd[1]: Started sshd@26-147.75.49.127:22-139.178.89.65:56858.service. Feb 9 20:06:35.950276 systemd-logind[1457]: Removed session 28. Feb 9 20:06:35.979322 sshd[2119]: Accepted publickey for core from 139.178.89.65 port 56858 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:35.980031 sshd[2119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:35.982683 systemd-logind[1457]: New session 29 of user core. Feb 9 20:06:35.983156 systemd[1]: Started session-29.scope. Feb 9 20:06:36.036464 sshd[2119]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:36.037671 systemd[1]: sshd@26-147.75.49.127:22-139.178.89.65:56858.service: Deactivated successfully. Feb 9 20:06:36.038086 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 20:06:36.038492 systemd-logind[1457]: Session 29 logged out. Waiting for processes to exit. Feb 9 20:06:36.038918 systemd-logind[1457]: Removed session 29. Feb 9 20:06:46.046573 systemd[1]: Started sshd@27-147.75.49.127:22-139.178.89.65:47054.service. Feb 9 20:06:46.076742 sshd[2130]: Accepted publickey for core from 139.178.89.65 port 47054 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:46.077641 sshd[2130]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:46.080745 systemd-logind[1457]: New session 30 of user core. Feb 9 20:06:46.081495 systemd[1]: Started session-30.scope. Feb 9 20:06:46.136395 sshd[2130]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:46.137812 systemd[1]: sshd@27-147.75.49.127:22-139.178.89.65:47054.service: Deactivated successfully. Feb 9 20:06:46.138115 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 20:06:46.138477 systemd-logind[1457]: Session 30 logged out. Waiting for processes to exit. Feb 9 20:06:46.138957 systemd[1]: Started sshd@28-147.75.49.127:22-139.178.89.65:47058.service. Feb 9 20:06:46.139459 systemd-logind[1457]: Removed session 30. Feb 9 20:06:46.168975 sshd[2136]: Accepted publickey for core from 139.178.89.65 port 47058 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:46.169939 sshd[2136]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:46.173466 systemd-logind[1457]: New session 31 of user core. Feb 9 20:06:46.174277 systemd[1]: Started session-31.scope. Feb 9 20:06:46.231074 sshd[2136]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:46.232405 systemd[1]: sshd@28-147.75.49.127:22-139.178.89.65:47058.service: Deactivated successfully. Feb 9 20:06:46.232790 systemd[1]: session-31.scope: Deactivated successfully. Feb 9 20:06:46.233230 systemd-logind[1457]: Session 31 logged out. Waiting for processes to exit. Feb 9 20:06:46.233759 systemd-logind[1457]: Removed session 31. Feb 9 20:06:56.240069 systemd[1]: Started sshd@29-147.75.49.127:22-139.178.89.65:40224.service. Feb 9 20:06:56.269811 sshd[2145]: Accepted publickey for core from 139.178.89.65 port 40224 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:56.270697 sshd[2145]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:56.273990 systemd-logind[1457]: New session 32 of user core. Feb 9 20:06:56.274689 systemd[1]: Started session-32.scope. Feb 9 20:06:56.329753 sshd[2145]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:56.331356 systemd[1]: sshd@29-147.75.49.127:22-139.178.89.65:40224.service: Deactivated successfully. Feb 9 20:06:56.331707 systemd[1]: session-32.scope: Deactivated successfully. Feb 9 20:06:56.332099 systemd-logind[1457]: Session 32 logged out. Waiting for processes to exit. Feb 9 20:06:56.332622 systemd[1]: Started sshd@30-147.75.49.127:22-139.178.89.65:40226.service. Feb 9 20:06:56.333159 systemd-logind[1457]: Removed session 32. Feb 9 20:06:56.362785 sshd[2151]: Accepted publickey for core from 139.178.89.65 port 40226 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:06:56.363675 sshd[2151]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:06:56.366998 systemd-logind[1457]: New session 33 of user core. Feb 9 20:06:56.367685 systemd[1]: Started session-33.scope. Feb 9 20:06:56.422860 sshd[2151]: pam_unix(sshd:session): session closed for user core Feb 9 20:06:56.424204 systemd[1]: sshd@30-147.75.49.127:22-139.178.89.65:40226.service: Deactivated successfully. Feb 9 20:06:56.424591 systemd[1]: session-33.scope: Deactivated successfully. Feb 9 20:06:56.424871 systemd-logind[1457]: Session 33 logged out. Waiting for processes to exit. Feb 9 20:06:56.425489 systemd-logind[1457]: Removed session 33. Feb 9 20:07:06.431649 systemd[1]: Started sshd@31-147.75.49.127:22-139.178.89.65:37262.service. Feb 9 20:07:06.461684 sshd[2157]: Accepted publickey for core from 139.178.89.65 port 37262 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:06.462578 sshd[2157]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:06.465727 systemd-logind[1457]: New session 34 of user core. Feb 9 20:07:06.466425 systemd[1]: Started session-34.scope. Feb 9 20:07:06.522002 sshd[2157]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:06.523602 systemd[1]: sshd@31-147.75.49.127:22-139.178.89.65:37262.service: Deactivated successfully. Feb 9 20:07:06.523925 systemd[1]: session-34.scope: Deactivated successfully. Feb 9 20:07:06.524304 systemd-logind[1457]: Session 34 logged out. Waiting for processes to exit. Feb 9 20:07:06.524805 systemd[1]: Started sshd@32-147.75.49.127:22-139.178.89.65:37270.service. Feb 9 20:07:06.525357 systemd-logind[1457]: Removed session 34. Feb 9 20:07:06.554834 sshd[2163]: Accepted publickey for core from 139.178.89.65 port 37270 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:06.555750 sshd[2163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:06.559031 systemd-logind[1457]: New session 35 of user core. Feb 9 20:07:06.559766 systemd[1]: Started session-35.scope. Feb 9 20:07:06.615862 sshd[2163]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:06.617194 systemd[1]: sshd@32-147.75.49.127:22-139.178.89.65:37270.service: Deactivated successfully. Feb 9 20:07:06.617584 systemd[1]: session-35.scope: Deactivated successfully. Feb 9 20:07:06.617852 systemd-logind[1457]: Session 35 logged out. Waiting for processes to exit. Feb 9 20:07:06.618487 systemd-logind[1457]: Removed session 35. Feb 9 20:07:16.625096 systemd[1]: Started sshd@33-147.75.49.127:22-139.178.89.65:42076.service. Feb 9 20:07:16.654853 sshd[2170]: Accepted publickey for core from 139.178.89.65 port 42076 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:16.655688 sshd[2170]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:16.658779 systemd-logind[1457]: New session 36 of user core. Feb 9 20:07:16.659390 systemd[1]: Started session-36.scope. Feb 9 20:07:16.714674 sshd[2170]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:16.716102 systemd[1]: sshd@33-147.75.49.127:22-139.178.89.65:42076.service: Deactivated successfully. Feb 9 20:07:16.716394 systemd[1]: session-36.scope: Deactivated successfully. Feb 9 20:07:16.716713 systemd-logind[1457]: Session 36 logged out. Waiting for processes to exit. Feb 9 20:07:16.717247 systemd[1]: Started sshd@34-147.75.49.127:22-139.178.89.65:42084.service. Feb 9 20:07:16.717720 systemd-logind[1457]: Removed session 36. Feb 9 20:07:16.747288 sshd[2176]: Accepted publickey for core from 139.178.89.65 port 42084 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:16.748262 sshd[2176]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:16.751719 systemd-logind[1457]: New session 37 of user core. Feb 9 20:07:16.752511 systemd[1]: Started session-37.scope. Feb 9 20:07:16.808682 sshd[2176]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:16.809960 systemd[1]: sshd@34-147.75.49.127:22-139.178.89.65:42084.service: Deactivated successfully. Feb 9 20:07:16.810353 systemd[1]: session-37.scope: Deactivated successfully. Feb 9 20:07:16.810714 systemd-logind[1457]: Session 37 logged out. Waiting for processes to exit. Feb 9 20:07:16.811313 systemd-logind[1457]: Removed session 37. Feb 9 20:07:26.818167 systemd[1]: Started sshd@35-147.75.49.127:22-139.178.89.65:39248.service. Feb 9 20:07:26.848242 sshd[2182]: Accepted publickey for core from 139.178.89.65 port 39248 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:26.849116 sshd[2182]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:26.852183 systemd-logind[1457]: New session 38 of user core. Feb 9 20:07:26.852889 systemd[1]: Started session-38.scope. Feb 9 20:07:26.907662 sshd[2182]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:26.909097 systemd[1]: sshd@35-147.75.49.127:22-139.178.89.65:39248.service: Deactivated successfully. Feb 9 20:07:26.909415 systemd[1]: session-38.scope: Deactivated successfully. Feb 9 20:07:26.909727 systemd-logind[1457]: Session 38 logged out. Waiting for processes to exit. Feb 9 20:07:26.910293 systemd[1]: Started sshd@36-147.75.49.127:22-139.178.89.65:39254.service. Feb 9 20:07:26.910721 systemd-logind[1457]: Removed session 38. Feb 9 20:07:26.940241 sshd[2188]: Accepted publickey for core from 139.178.89.65 port 39254 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:26.941173 sshd[2188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:26.944418 systemd-logind[1457]: New session 39 of user core. Feb 9 20:07:26.945141 systemd[1]: Started session-39.scope. Feb 9 20:07:27.011270 sshd[2188]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:27.016983 systemd[1]: sshd@36-147.75.49.127:22-139.178.89.65:39254.service: Deactivated successfully. Feb 9 20:07:27.018668 systemd[1]: session-39.scope: Deactivated successfully. Feb 9 20:07:27.020391 systemd-logind[1457]: Session 39 logged out. Waiting for processes to exit. Feb 9 20:07:27.022712 systemd-logind[1457]: Removed session 39. Feb 9 20:07:33.186980 systemd[1]: Started sshd@37-147.75.49.127:22-218.92.0.56:14121.service. Feb 9 20:07:34.220125 sshd[2194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 20:07:36.334448 sshd[2194]: Failed password for root from 218.92.0.56 port 14121 ssh2 Feb 9 20:07:37.019824 systemd[1]: Started sshd@38-147.75.49.127:22-139.178.89.65:59802.service. Feb 9 20:07:37.049311 sshd[2197]: Accepted publickey for core from 139.178.89.65 port 59802 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:37.050178 sshd[2197]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:37.053308 systemd-logind[1457]: New session 40 of user core. Feb 9 20:07:37.054043 systemd[1]: Started session-40.scope. Feb 9 20:07:37.108494 sshd[2197]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:37.110044 systemd[1]: sshd@38-147.75.49.127:22-139.178.89.65:59802.service: Deactivated successfully. Feb 9 20:07:37.110350 systemd[1]: session-40.scope: Deactivated successfully. Feb 9 20:07:37.110652 systemd-logind[1457]: Session 40 logged out. Waiting for processes to exit. Feb 9 20:07:37.111194 systemd[1]: Started sshd@39-147.75.49.127:22-139.178.89.65:59810.service. Feb 9 20:07:37.111621 systemd-logind[1457]: Removed session 40. Feb 9 20:07:37.141273 sshd[2203]: Accepted publickey for core from 139.178.89.65 port 59810 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:37.142273 sshd[2203]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:37.145787 systemd-logind[1457]: New session 41 of user core. Feb 9 20:07:37.146569 systemd[1]: Started session-41.scope. Feb 9 20:07:37.202606 sshd[2203]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:37.203770 systemd[1]: sshd@39-147.75.49.127:22-139.178.89.65:59810.service: Deactivated successfully. Feb 9 20:07:37.204185 systemd[1]: session-41.scope: Deactivated successfully. Feb 9 20:07:37.204564 systemd-logind[1457]: Session 41 logged out. Waiting for processes to exit. Feb 9 20:07:37.205009 systemd-logind[1457]: Removed session 41. Feb 9 20:07:39.297261 sshd[2194]: Failed password for root from 218.92.0.56 port 14121 ssh2 Feb 9 20:07:42.596438 sshd[2194]: Failed password for root from 218.92.0.56 port 14121 ssh2 Feb 9 20:07:43.876576 sshd[2194]: Received disconnect from 218.92.0.56 port 14121:11: [preauth] Feb 9 20:07:43.876576 sshd[2194]: Disconnected from authenticating user root 218.92.0.56 port 14121 [preauth] Feb 9 20:07:43.877134 sshd[2194]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 20:07:43.879188 systemd[1]: sshd@37-147.75.49.127:22-218.92.0.56:14121.service: Deactivated successfully. Feb 9 20:07:44.036468 systemd[1]: Started sshd@40-147.75.49.127:22-218.92.0.56:20246.service. Feb 9 20:07:45.055234 sshd[2210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 20:07:46.677946 sshd[2210]: Failed password for root from 218.92.0.56 port 20246 ssh2 Feb 9 20:07:47.212097 systemd[1]: Started sshd@41-147.75.49.127:22-139.178.89.65:60396.service. Feb 9 20:07:47.241925 sshd[2213]: Accepted publickey for core from 139.178.89.65 port 60396 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:47.242808 sshd[2213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:47.245753 systemd-logind[1457]: New session 42 of user core. Feb 9 20:07:47.246511 systemd[1]: Started session-42.scope. Feb 9 20:07:47.301774 sshd[2213]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:47.303253 systemd[1]: sshd@41-147.75.49.127:22-139.178.89.65:60396.service: Deactivated successfully. Feb 9 20:07:47.303550 systemd[1]: session-42.scope: Deactivated successfully. Feb 9 20:07:47.303832 systemd-logind[1457]: Session 42 logged out. Waiting for processes to exit. Feb 9 20:07:47.304358 systemd[1]: Started sshd@42-147.75.49.127:22-139.178.89.65:60410.service. Feb 9 20:07:47.304778 systemd-logind[1457]: Removed session 42. Feb 9 20:07:47.334673 sshd[2219]: Accepted publickey for core from 139.178.89.65 port 60410 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:47.337892 sshd[2219]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:47.348112 systemd-logind[1457]: New session 43 of user core. Feb 9 20:07:47.350458 systemd[1]: Started session-43.scope. Feb 9 20:07:47.430151 sshd[2219]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:47.435626 systemd[1]: sshd@42-147.75.49.127:22-139.178.89.65:60410.service: Deactivated successfully. Feb 9 20:07:47.437335 systemd[1]: session-43.scope: Deactivated successfully. Feb 9 20:07:47.439031 systemd-logind[1457]: Session 43 logged out. Waiting for processes to exit. Feb 9 20:07:47.441366 systemd-logind[1457]: Removed session 43. Feb 9 20:07:48.272377 sshd[2210]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 20:07:50.080033 systemd[1]: Started sshd@43-147.75.49.127:22-218.92.0.43:43540.service. Feb 9 20:07:50.224355 sshd[2225]: Unable to negotiate with 218.92.0.43 port 43540: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 20:07:50.226216 systemd[1]: sshd@43-147.75.49.127:22-218.92.0.43:43540.service: Deactivated successfully. Feb 9 20:07:50.306426 sshd[2210]: Failed password for root from 218.92.0.56 port 20246 ssh2 Feb 9 20:07:53.603064 sshd[2210]: Failed password for root from 218.92.0.56 port 20246 ssh2 Feb 9 20:07:54.705378 sshd[2210]: Received disconnect from 218.92.0.56 port 20246:11: [preauth] Feb 9 20:07:54.705378 sshd[2210]: Disconnected from authenticating user root 218.92.0.56 port 20246 [preauth] Feb 9 20:07:54.705949 sshd[2210]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 20:07:54.707978 systemd[1]: sshd@40-147.75.49.127:22-218.92.0.56:20246.service: Deactivated successfully. Feb 9 20:07:54.867141 systemd[1]: Started sshd@44-147.75.49.127:22-218.92.0.56:20161.service. Feb 9 20:07:55.886758 sshd[2230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 20:07:57.438690 systemd[1]: Started sshd@45-147.75.49.127:22-139.178.89.65:49478.service. Feb 9 20:07:57.468313 sshd[2233]: Accepted publickey for core from 139.178.89.65 port 49478 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:57.469192 sshd[2233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:57.472273 systemd-logind[1457]: New session 44 of user core. Feb 9 20:07:57.473026 systemd[1]: Started session-44.scope. Feb 9 20:07:57.529011 sshd[2233]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:57.530561 systemd[1]: sshd@45-147.75.49.127:22-139.178.89.65:49478.service: Deactivated successfully. Feb 9 20:07:57.530957 systemd[1]: session-44.scope: Deactivated successfully. Feb 9 20:07:57.531281 systemd-logind[1457]: Session 44 logged out. Waiting for processes to exit. Feb 9 20:07:57.531770 systemd[1]: Started sshd@46-147.75.49.127:22-139.178.89.65:49488.service. Feb 9 20:07:57.532216 systemd-logind[1457]: Removed session 44. Feb 9 20:07:57.561335 sshd[2239]: Accepted publickey for core from 139.178.89.65 port 49488 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:07:57.562223 sshd[2239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:07:57.565299 systemd-logind[1457]: New session 45 of user core. Feb 9 20:07:57.566041 systemd[1]: Started session-45.scope. Feb 9 20:07:57.632633 sshd[2239]: pam_unix(sshd:session): session closed for user core Feb 9 20:07:57.638081 systemd[1]: sshd@46-147.75.49.127:22-139.178.89.65:49488.service: Deactivated successfully. Feb 9 20:07:57.639789 systemd[1]: session-45.scope: Deactivated successfully. Feb 9 20:07:57.641456 systemd-logind[1457]: Session 45 logged out. Waiting for processes to exit. Feb 9 20:07:57.643829 systemd-logind[1457]: Removed session 45. Feb 9 20:07:58.216839 sshd[2230]: Failed password for root from 218.92.0.56 port 20161 ssh2 Feb 9 20:08:00.981798 sshd[2230]: Failed password for root from 218.92.0.56 port 20161 ssh2 Feb 9 20:08:04.946548 sshd[2230]: Failed password for root from 218.92.0.56 port 20161 ssh2 Feb 9 20:08:05.537088 sshd[2230]: Received disconnect from 218.92.0.56 port 20161:11: [preauth] Feb 9 20:08:05.537088 sshd[2230]: Disconnected from authenticating user root 218.92.0.56 port 20161 [preauth] Feb 9 20:08:05.537642 sshd[2230]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 20:08:05.539660 systemd[1]: sshd@44-147.75.49.127:22-218.92.0.56:20161.service: Deactivated successfully. Feb 9 20:08:07.641424 systemd[1]: Started sshd@47-147.75.49.127:22-139.178.89.65:36352.service. Feb 9 20:08:07.671350 sshd[2246]: Accepted publickey for core from 139.178.89.65 port 36352 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:07.672237 sshd[2246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:07.675251 systemd-logind[1457]: New session 46 of user core. Feb 9 20:08:07.675841 systemd[1]: Started session-46.scope. Feb 9 20:08:07.731642 sshd[2246]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:07.733213 systemd[1]: sshd@47-147.75.49.127:22-139.178.89.65:36352.service: Deactivated successfully. Feb 9 20:08:07.733543 systemd[1]: session-46.scope: Deactivated successfully. Feb 9 20:08:07.733828 systemd-logind[1457]: Session 46 logged out. Waiting for processes to exit. Feb 9 20:08:07.734340 systemd[1]: Started sshd@48-147.75.49.127:22-139.178.89.65:36364.service. Feb 9 20:08:07.734715 systemd-logind[1457]: Removed session 46. Feb 9 20:08:07.764269 sshd[2252]: Accepted publickey for core from 139.178.89.65 port 36364 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:07.765245 sshd[2252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:07.768600 systemd-logind[1457]: New session 47 of user core. Feb 9 20:08:07.769360 systemd[1]: Started session-47.scope. Feb 9 20:08:07.836704 sshd[2252]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:07.842453 systemd[1]: sshd@48-147.75.49.127:22-139.178.89.65:36364.service: Deactivated successfully. Feb 9 20:08:07.844156 systemd[1]: session-47.scope: Deactivated successfully. Feb 9 20:08:07.845883 systemd-logind[1457]: Session 47 logged out. Waiting for processes to exit. Feb 9 20:08:07.848086 systemd-logind[1457]: Removed session 47. Feb 9 20:08:17.844775 systemd[1]: Started sshd@49-147.75.49.127:22-139.178.89.65:44808.service. Feb 9 20:08:17.874791 sshd[2258]: Accepted publickey for core from 139.178.89.65 port 44808 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:17.875767 sshd[2258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:17.879125 systemd-logind[1457]: New session 48 of user core. Feb 9 20:08:17.879858 systemd[1]: Started session-48.scope. Feb 9 20:08:17.934665 sshd[2258]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:17.936396 systemd[1]: sshd@49-147.75.49.127:22-139.178.89.65:44808.service: Deactivated successfully. Feb 9 20:08:17.936693 systemd[1]: session-48.scope: Deactivated successfully. Feb 9 20:08:17.936963 systemd-logind[1457]: Session 48 logged out. Waiting for processes to exit. Feb 9 20:08:17.937455 systemd[1]: Started sshd@50-147.75.49.127:22-139.178.89.65:44822.service. Feb 9 20:08:17.937816 systemd-logind[1457]: Removed session 48. Feb 9 20:08:17.967198 sshd[2264]: Accepted publickey for core from 139.178.89.65 port 44822 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:17.968178 sshd[2264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:17.971680 systemd-logind[1457]: New session 49 of user core. Feb 9 20:08:17.972458 systemd[1]: Started session-49.scope. Feb 9 20:08:18.039013 sshd[2264]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:18.044809 systemd[1]: sshd@50-147.75.49.127:22-139.178.89.65:44822.service: Deactivated successfully. Feb 9 20:08:18.046550 systemd[1]: session-49.scope: Deactivated successfully. Feb 9 20:08:18.048210 systemd-logind[1457]: Session 49 logged out. Waiting for processes to exit. Feb 9 20:08:18.050489 systemd-logind[1457]: Removed session 49. Feb 9 20:08:28.047732 systemd[1]: Started sshd@51-147.75.49.127:22-139.178.89.65:60566.service. Feb 9 20:08:28.077777 sshd[2270]: Accepted publickey for core from 139.178.89.65 port 60566 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:28.078660 sshd[2270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:28.081818 systemd-logind[1457]: New session 50 of user core. Feb 9 20:08:28.082545 systemd[1]: Started session-50.scope. Feb 9 20:08:28.138237 sshd[2270]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:28.139800 systemd[1]: sshd@51-147.75.49.127:22-139.178.89.65:60566.service: Deactivated successfully. Feb 9 20:08:28.140162 systemd[1]: session-50.scope: Deactivated successfully. Feb 9 20:08:28.140562 systemd-logind[1457]: Session 50 logged out. Waiting for processes to exit. Feb 9 20:08:28.141145 systemd[1]: Started sshd@52-147.75.49.127:22-139.178.89.65:60576.service. Feb 9 20:08:28.141651 systemd-logind[1457]: Removed session 50. Feb 9 20:08:28.170946 sshd[2276]: Accepted publickey for core from 139.178.89.65 port 60576 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:28.171907 sshd[2276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:28.175350 systemd-logind[1457]: New session 51 of user core. Feb 9 20:08:28.176037 systemd[1]: Started session-51.scope. Feb 9 20:08:28.232326 sshd[2276]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:28.233584 systemd[1]: sshd@52-147.75.49.127:22-139.178.89.65:60576.service: Deactivated successfully. Feb 9 20:08:28.233981 systemd[1]: session-51.scope: Deactivated successfully. Feb 9 20:08:28.234357 systemd-logind[1457]: Session 51 logged out. Waiting for processes to exit. Feb 9 20:08:28.234864 systemd-logind[1457]: Removed session 51. Feb 9 20:08:38.241691 systemd[1]: Started sshd@53-147.75.49.127:22-139.178.89.65:52890.service. Feb 9 20:08:38.271221 sshd[2283]: Accepted publickey for core from 139.178.89.65 port 52890 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:38.272126 sshd[2283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:38.274950 systemd-logind[1457]: New session 52 of user core. Feb 9 20:08:38.275640 systemd[1]: Started session-52.scope. Feb 9 20:08:38.329260 sshd[2283]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:38.331176 systemd[1]: sshd@53-147.75.49.127:22-139.178.89.65:52890.service: Deactivated successfully. Feb 9 20:08:38.331498 systemd[1]: session-52.scope: Deactivated successfully. Feb 9 20:08:38.331833 systemd-logind[1457]: Session 52 logged out. Waiting for processes to exit. Feb 9 20:08:38.332433 systemd[1]: Started sshd@54-147.75.49.127:22-139.178.89.65:52894.service. Feb 9 20:08:38.332837 systemd-logind[1457]: Removed session 52. Feb 9 20:08:38.362339 sshd[2289]: Accepted publickey for core from 139.178.89.65 port 52894 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:38.363249 sshd[2289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:38.366666 systemd-logind[1457]: New session 53 of user core. Feb 9 20:08:38.367364 systemd[1]: Started session-53.scope. Feb 9 20:08:38.433582 sshd[2289]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:38.438862 systemd[1]: sshd@54-147.75.49.127:22-139.178.89.65:52894.service: Deactivated successfully. Feb 9 20:08:38.440590 systemd[1]: session-53.scope: Deactivated successfully. Feb 9 20:08:38.442386 systemd-logind[1457]: Session 53 logged out. Waiting for processes to exit. Feb 9 20:08:38.444759 systemd-logind[1457]: Removed session 53. Feb 9 20:08:48.441974 systemd[1]: Started sshd@55-147.75.49.127:22-139.178.89.65:37596.service. Feb 9 20:08:48.471759 sshd[2297]: Accepted publickey for core from 139.178.89.65 port 37596 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:48.472657 sshd[2297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:48.475634 systemd-logind[1457]: New session 54 of user core. Feb 9 20:08:48.476357 systemd[1]: Started session-54.scope. Feb 9 20:08:48.531526 sshd[2297]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:48.532814 systemd[1]: sshd@55-147.75.49.127:22-139.178.89.65:37596.service: Deactivated successfully. Feb 9 20:08:48.533120 systemd[1]: session-54.scope: Deactivated successfully. Feb 9 20:08:48.533437 systemd-logind[1457]: Session 54 logged out. Waiting for processes to exit. Feb 9 20:08:48.533953 systemd[1]: Started sshd@56-147.75.49.127:22-139.178.89.65:37598.service. Feb 9 20:08:48.534346 systemd-logind[1457]: Removed session 54. Feb 9 20:08:48.564225 sshd[2303]: Accepted publickey for core from 139.178.89.65 port 37598 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:48.565197 sshd[2303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:48.568387 systemd-logind[1457]: New session 55 of user core. Feb 9 20:08:48.569140 systemd[1]: Started session-55.scope. Feb 9 20:08:48.635423 sshd[2303]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:48.640830 systemd[1]: sshd@56-147.75.49.127:22-139.178.89.65:37598.service: Deactivated successfully. Feb 9 20:08:48.642557 systemd[1]: session-55.scope: Deactivated successfully. Feb 9 20:08:48.644347 systemd-logind[1457]: Session 55 logged out. Waiting for processes to exit. Feb 9 20:08:48.646668 systemd-logind[1457]: Removed session 55. Feb 9 20:08:58.643369 systemd[1]: Started sshd@57-147.75.49.127:22-139.178.89.65:35284.service. Feb 9 20:08:58.673010 sshd[2310]: Accepted publickey for core from 139.178.89.65 port 35284 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:58.673889 sshd[2310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:58.676963 systemd-logind[1457]: New session 56 of user core. Feb 9 20:08:58.677647 systemd[1]: Started session-56.scope. Feb 9 20:08:58.732548 sshd[2310]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:58.734337 systemd[1]: sshd@57-147.75.49.127:22-139.178.89.65:35284.service: Deactivated successfully. Feb 9 20:08:58.734649 systemd[1]: session-56.scope: Deactivated successfully. Feb 9 20:08:58.734910 systemd-logind[1457]: Session 56 logged out. Waiting for processes to exit. Feb 9 20:08:58.735439 systemd[1]: Started sshd@58-147.75.49.127:22-139.178.89.65:35296.service. Feb 9 20:08:58.735839 systemd-logind[1457]: Removed session 56. Feb 9 20:08:58.765325 sshd[2316]: Accepted publickey for core from 139.178.89.65 port 35296 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:08:58.766161 sshd[2316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:08:58.769193 systemd-logind[1457]: New session 57 of user core. Feb 9 20:08:58.769781 systemd[1]: Started session-57.scope. Feb 9 20:08:58.835076 sshd[2316]: pam_unix(sshd:session): session closed for user core Feb 9 20:08:58.840715 systemd[1]: sshd@58-147.75.49.127:22-139.178.89.65:35296.service: Deactivated successfully. Feb 9 20:08:58.842444 systemd[1]: session-57.scope: Deactivated successfully. Feb 9 20:08:58.844094 systemd-logind[1457]: Session 57 logged out. Waiting for processes to exit. Feb 9 20:08:58.846368 systemd-logind[1457]: Removed session 57. Feb 9 20:09:08.843306 systemd[1]: Started sshd@59-147.75.49.127:22-139.178.89.65:40612.service. Feb 9 20:09:08.873041 sshd[2322]: Accepted publickey for core from 139.178.89.65 port 40612 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:08.873938 sshd[2322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:08.877213 systemd-logind[1457]: New session 58 of user core. Feb 9 20:09:08.877871 systemd[1]: Started session-58.scope. Feb 9 20:09:08.934505 sshd[2322]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:08.936200 systemd[1]: sshd@59-147.75.49.127:22-139.178.89.65:40612.service: Deactivated successfully. Feb 9 20:09:08.936498 systemd[1]: session-58.scope: Deactivated successfully. Feb 9 20:09:08.936823 systemd-logind[1457]: Session 58 logged out. Waiting for processes to exit. Feb 9 20:09:08.937332 systemd[1]: Started sshd@60-147.75.49.127:22-139.178.89.65:40618.service. Feb 9 20:09:08.937748 systemd-logind[1457]: Removed session 58. Feb 9 20:09:08.967036 sshd[2328]: Accepted publickey for core from 139.178.89.65 port 40618 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:08.968028 sshd[2328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:08.971439 systemd-logind[1457]: New session 59 of user core. Feb 9 20:09:08.972178 systemd[1]: Started session-59.scope. Feb 9 20:09:09.027568 sshd[2328]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:09.028744 systemd[1]: sshd@60-147.75.49.127:22-139.178.89.65:40618.service: Deactivated successfully. Feb 9 20:09:09.029152 systemd[1]: session-59.scope: Deactivated successfully. Feb 9 20:09:09.029542 systemd-logind[1457]: Session 59 logged out. Waiting for processes to exit. Feb 9 20:09:09.030015 systemd-logind[1457]: Removed session 59. Feb 9 20:09:19.036826 systemd[1]: Started sshd@61-147.75.49.127:22-139.178.89.65:51170.service. Feb 9 20:09:19.066903 sshd[2334]: Accepted publickey for core from 139.178.89.65 port 51170 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:19.067788 sshd[2334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:19.070879 systemd-logind[1457]: New session 60 of user core. Feb 9 20:09:19.071611 systemd[1]: Started session-60.scope. Feb 9 20:09:19.127052 sshd[2334]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:19.128806 systemd[1]: sshd@61-147.75.49.127:22-139.178.89.65:51170.service: Deactivated successfully. Feb 9 20:09:19.129207 systemd[1]: session-60.scope: Deactivated successfully. Feb 9 20:09:19.129583 systemd-logind[1457]: Session 60 logged out. Waiting for processes to exit. Feb 9 20:09:19.130076 systemd[1]: Started sshd@62-147.75.49.127:22-139.178.89.65:51186.service. Feb 9 20:09:19.130592 systemd-logind[1457]: Removed session 60. Feb 9 20:09:19.159907 sshd[2340]: Accepted publickey for core from 139.178.89.65 port 51186 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:19.160918 sshd[2340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:19.164399 systemd-logind[1457]: New session 61 of user core. Feb 9 20:09:19.165223 systemd[1]: Started session-61.scope. Feb 9 20:09:19.231736 sshd[2340]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:19.237367 systemd[1]: sshd@62-147.75.49.127:22-139.178.89.65:51186.service: Deactivated successfully. Feb 9 20:09:19.239071 systemd[1]: session-61.scope: Deactivated successfully. Feb 9 20:09:19.240768 systemd-logind[1457]: Session 61 logged out. Waiting for processes to exit. Feb 9 20:09:19.243037 systemd-logind[1457]: Removed session 61. Feb 9 20:09:29.240403 systemd[1]: Started sshd@63-147.75.49.127:22-139.178.89.65:47842.service. Feb 9 20:09:29.269887 sshd[2347]: Accepted publickey for core from 139.178.89.65 port 47842 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:29.270776 sshd[2347]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:29.273726 systemd-logind[1457]: New session 62 of user core. Feb 9 20:09:29.274370 systemd[1]: Started session-62.scope. Feb 9 20:09:29.329073 sshd[2347]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:29.330563 systemd[1]: sshd@63-147.75.49.127:22-139.178.89.65:47842.service: Deactivated successfully. Feb 9 20:09:29.330864 systemd[1]: session-62.scope: Deactivated successfully. Feb 9 20:09:29.331200 systemd-logind[1457]: Session 62 logged out. Waiting for processes to exit. Feb 9 20:09:29.331681 systemd[1]: Started sshd@64-147.75.49.127:22-139.178.89.65:47846.service. Feb 9 20:09:29.332084 systemd-logind[1457]: Removed session 62. Feb 9 20:09:29.362047 sshd[2353]: Accepted publickey for core from 139.178.89.65 port 47846 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:29.363039 sshd[2353]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:29.366688 systemd-logind[1457]: New session 63 of user core. Feb 9 20:09:29.367456 systemd[1]: Started session-63.scope. Feb 9 20:09:29.421414 sshd[2353]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:29.422646 systemd[1]: sshd@64-147.75.49.127:22-139.178.89.65:47846.service: Deactivated successfully. Feb 9 20:09:29.423023 systemd[1]: session-63.scope: Deactivated successfully. Feb 9 20:09:29.423422 systemd-logind[1457]: Session 63 logged out. Waiting for processes to exit. Feb 9 20:09:29.423884 systemd-logind[1457]: Removed session 63. Feb 9 20:09:39.431143 systemd[1]: Started sshd@65-147.75.49.127:22-139.178.89.65:49592.service. Feb 9 20:09:39.460984 sshd[2361]: Accepted publickey for core from 139.178.89.65 port 49592 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:39.461880 sshd[2361]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:39.465222 systemd-logind[1457]: New session 64 of user core. Feb 9 20:09:39.465833 systemd[1]: Started session-64.scope. Feb 9 20:09:39.520988 sshd[2361]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:39.522670 systemd[1]: sshd@65-147.75.49.127:22-139.178.89.65:49592.service: Deactivated successfully. Feb 9 20:09:39.523083 systemd[1]: session-64.scope: Deactivated successfully. Feb 9 20:09:39.523451 systemd-logind[1457]: Session 64 logged out. Waiting for processes to exit. Feb 9 20:09:39.523977 systemd[1]: Started sshd@66-147.75.49.127:22-139.178.89.65:49600.service. Feb 9 20:09:39.524436 systemd-logind[1457]: Removed session 64. Feb 9 20:09:39.554045 sshd[2368]: Accepted publickey for core from 139.178.89.65 port 49600 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:39.555064 sshd[2368]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:39.558447 systemd-logind[1457]: New session 65 of user core. Feb 9 20:09:39.559184 systemd[1]: Started session-65.scope. Feb 9 20:09:39.614852 sshd[2368]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:39.616157 systemd[1]: sshd@66-147.75.49.127:22-139.178.89.65:49600.service: Deactivated successfully. Feb 9 20:09:39.616540 systemd[1]: session-65.scope: Deactivated successfully. Feb 9 20:09:39.616851 systemd-logind[1457]: Session 65 logged out. Waiting for processes to exit. Feb 9 20:09:39.617469 systemd-logind[1457]: Removed session 65. Feb 9 20:09:49.624046 systemd[1]: Started sshd@67-147.75.49.127:22-139.178.89.65:33724.service. Feb 9 20:09:49.653762 sshd[2376]: Accepted publickey for core from 139.178.89.65 port 33724 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:49.654606 sshd[2376]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:49.657541 systemd-logind[1457]: New session 66 of user core. Feb 9 20:09:49.658129 systemd[1]: Started session-66.scope. Feb 9 20:09:49.713193 sshd[2376]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:49.714615 systemd[1]: sshd@67-147.75.49.127:22-139.178.89.65:33724.service: Deactivated successfully. Feb 9 20:09:49.714917 systemd[1]: session-66.scope: Deactivated successfully. Feb 9 20:09:49.715223 systemd-logind[1457]: Session 66 logged out. Waiting for processes to exit. Feb 9 20:09:49.715723 systemd[1]: Started sshd@68-147.75.49.127:22-139.178.89.65:33732.service. Feb 9 20:09:49.716115 systemd-logind[1457]: Removed session 66. Feb 9 20:09:49.745599 sshd[2382]: Accepted publickey for core from 139.178.89.65 port 33732 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:49.746571 sshd[2382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:49.749825 systemd-logind[1457]: New session 67 of user core. Feb 9 20:09:49.750651 systemd[1]: Started session-67.scope. Feb 9 20:09:49.817454 sshd[2382]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:49.822826 systemd[1]: sshd@68-147.75.49.127:22-139.178.89.65:33732.service: Deactivated successfully. Feb 9 20:09:49.824523 systemd[1]: session-67.scope: Deactivated successfully. Feb 9 20:09:49.826224 systemd-logind[1457]: Session 67 logged out. Waiting for processes to exit. Feb 9 20:09:49.828563 systemd-logind[1457]: Removed session 67. Feb 9 20:09:59.825769 systemd[1]: Started sshd@69-147.75.49.127:22-139.178.89.65:47670.service. Feb 9 20:09:59.855744 sshd[2389]: Accepted publickey for core from 139.178.89.65 port 47670 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:59.856636 sshd[2389]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:59.859756 systemd-logind[1457]: New session 68 of user core. Feb 9 20:09:59.860444 systemd[1]: Started session-68.scope. Feb 9 20:09:59.915435 sshd[2389]: pam_unix(sshd:session): session closed for user core Feb 9 20:09:59.917035 systemd[1]: sshd@69-147.75.49.127:22-139.178.89.65:47670.service: Deactivated successfully. Feb 9 20:09:59.917403 systemd[1]: session-68.scope: Deactivated successfully. Feb 9 20:09:59.917700 systemd-logind[1457]: Session 68 logged out. Waiting for processes to exit. Feb 9 20:09:59.918215 systemd[1]: Started sshd@70-147.75.49.127:22-139.178.89.65:47678.service. Feb 9 20:09:59.918628 systemd-logind[1457]: Removed session 68. Feb 9 20:09:59.948006 sshd[2395]: Accepted publickey for core from 139.178.89.65 port 47678 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:09:59.948989 sshd[2395]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:09:59.952118 systemd-logind[1457]: New session 69 of user core. Feb 9 20:09:59.952935 systemd[1]: Started session-69.scope. Feb 9 20:10:00.019064 sshd[2395]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:00.024561 systemd[1]: sshd@70-147.75.49.127:22-139.178.89.65:47678.service: Deactivated successfully. Feb 9 20:10:00.026271 systemd[1]: session-69.scope: Deactivated successfully. Feb 9 20:10:00.027950 systemd-logind[1457]: Session 69 logged out. Waiting for processes to exit. Feb 9 20:10:00.030192 systemd-logind[1457]: Removed session 69. Feb 9 20:10:10.027312 systemd[1]: Started sshd@71-147.75.49.127:22-139.178.89.65:46950.service. Feb 9 20:10:10.056894 sshd[2401]: Accepted publickey for core from 139.178.89.65 port 46950 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:10:10.057777 sshd[2401]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:10:10.060842 systemd-logind[1457]: New session 70 of user core. Feb 9 20:10:10.061561 systemd[1]: Started session-70.scope. Feb 9 20:10:10.116201 sshd[2401]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:10.117771 systemd[1]: sshd@71-147.75.49.127:22-139.178.89.65:46950.service: Deactivated successfully. Feb 9 20:10:10.118076 systemd[1]: session-70.scope: Deactivated successfully. Feb 9 20:10:10.118381 systemd-logind[1457]: Session 70 logged out. Waiting for processes to exit. Feb 9 20:10:10.118907 systemd[1]: Started sshd@72-147.75.49.127:22-139.178.89.65:46966.service. Feb 9 20:10:10.119299 systemd-logind[1457]: Removed session 70. Feb 9 20:10:10.148825 sshd[2407]: Accepted publickey for core from 139.178.89.65 port 46966 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:10:10.149808 sshd[2407]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:10:10.152966 systemd-logind[1457]: New session 71 of user core. Feb 9 20:10:10.153786 systemd[1]: Started session-71.scope. Feb 9 20:10:10.209435 sshd[2407]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:10.210618 systemd[1]: sshd@72-147.75.49.127:22-139.178.89.65:46966.service: Deactivated successfully. Feb 9 20:10:10.211010 systemd[1]: session-71.scope: Deactivated successfully. Feb 9 20:10:10.211322 systemd-logind[1457]: Session 71 logged out. Waiting for processes to exit. Feb 9 20:10:10.211774 systemd-logind[1457]: Removed session 71. Feb 9 20:10:20.218483 systemd[1]: Started sshd@73-147.75.49.127:22-139.178.89.65:38830.service. Feb 9 20:10:20.248696 sshd[2413]: Accepted publickey for core from 139.178.89.65 port 38830 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:10:20.249700 sshd[2413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:10:20.252906 systemd-logind[1457]: New session 72 of user core. Feb 9 20:10:20.253641 systemd[1]: Started session-72.scope. Feb 9 20:10:20.309210 sshd[2413]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:20.310690 systemd[1]: sshd@73-147.75.49.127:22-139.178.89.65:38830.service: Deactivated successfully. Feb 9 20:10:20.310996 systemd[1]: session-72.scope: Deactivated successfully. Feb 9 20:10:20.311310 systemd-logind[1457]: Session 72 logged out. Waiting for processes to exit. Feb 9 20:10:20.311840 systemd[1]: Started sshd@74-147.75.49.127:22-139.178.89.65:38844.service. Feb 9 20:10:20.312247 systemd-logind[1457]: Removed session 72. Feb 9 20:10:20.342260 sshd[2419]: Accepted publickey for core from 139.178.89.65 port 38844 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:10:20.343115 sshd[2419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:10:20.345789 systemd-logind[1457]: New session 73 of user core. Feb 9 20:10:20.346485 systemd[1]: Started session-73.scope. Feb 9 20:10:20.411630 sshd[2419]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:20.417124 systemd[1]: sshd@74-147.75.49.127:22-139.178.89.65:38844.service: Deactivated successfully. Feb 9 20:10:20.418833 systemd[1]: session-73.scope: Deactivated successfully. Feb 9 20:10:20.420613 systemd-logind[1457]: Session 73 logged out. Waiting for processes to exit. Feb 9 20:10:20.422891 systemd-logind[1457]: Removed session 73. Feb 9 20:10:25.510652 systemd[1]: Started sshd@75-147.75.49.127:22-218.92.0.113:61521.service. Feb 9 20:10:26.600604 sshd[2426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 20:10:28.659754 sshd[2426]: Failed password for root from 218.92.0.113 port 61521 ssh2 Feb 9 20:10:30.420329 systemd[1]: Started sshd@76-147.75.49.127:22-139.178.89.65:38976.service. Feb 9 20:10:30.450014 sshd[2429]: Accepted publickey for core from 139.178.89.65 port 38976 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:10:30.450896 sshd[2429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:10:30.453768 systemd-logind[1457]: New session 74 of user core. Feb 9 20:10:30.454481 systemd[1]: Started session-74.scope. Feb 9 20:10:30.509275 sshd[2429]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:30.510803 systemd[1]: sshd@76-147.75.49.127:22-139.178.89.65:38976.service: Deactivated successfully. Feb 9 20:10:30.511107 systemd[1]: session-74.scope: Deactivated successfully. Feb 9 20:10:30.511404 systemd-logind[1457]: Session 74 logged out. Waiting for processes to exit. Feb 9 20:10:30.511942 systemd[1]: Started sshd@77-147.75.49.127:22-139.178.89.65:38984.service. Feb 9 20:10:30.512324 systemd-logind[1457]: Removed session 74. Feb 9 20:10:30.541752 sshd[2435]: Accepted publickey for core from 139.178.89.65 port 38984 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:10:30.542721 sshd[2435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:10:30.545889 systemd-logind[1457]: New session 75 of user core. Feb 9 20:10:30.546717 systemd[1]: Started session-75.scope. Feb 9 20:10:30.602316 sshd[2435]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:30.603482 systemd[1]: sshd@77-147.75.49.127:22-139.178.89.65:38984.service: Deactivated successfully. Feb 9 20:10:30.603852 systemd[1]: session-75.scope: Deactivated successfully. Feb 9 20:10:30.604240 systemd-logind[1457]: Session 75 logged out. Waiting for processes to exit. Feb 9 20:10:30.604672 systemd-logind[1457]: Removed session 75. Feb 9 20:10:31.632709 sshd[2426]: Failed password for root from 218.92.0.113 port 61521 ssh2 Feb 9 20:10:35.744691 sshd[2426]: Failed password for root from 218.92.0.113 port 61521 ssh2 Feb 9 20:10:36.286848 sshd[2426]: Received disconnect from 218.92.0.113 port 61521:11: [preauth] Feb 9 20:10:36.286848 sshd[2426]: Disconnected from authenticating user root 218.92.0.113 port 61521 [preauth] Feb 9 20:10:36.287388 sshd[2426]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 20:10:36.289431 systemd[1]: sshd@75-147.75.49.127:22-218.92.0.113:61521.service: Deactivated successfully. Feb 9 20:10:36.448136 systemd[1]: Started sshd@78-147.75.49.127:22-218.92.0.113:19575.service. Feb 9 20:10:37.497946 sshd[2442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 20:10:39.401436 sshd[2442]: Failed password for root from 218.92.0.113 port 19575 ssh2 Feb 9 20:10:40.611836 systemd[1]: Started sshd@79-147.75.49.127:22-139.178.89.65:52912.service. Feb 9 20:10:40.641887 sshd[2445]: Accepted publickey for core from 139.178.89.65 port 52912 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:10:40.642763 sshd[2445]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:10:40.645825 systemd-logind[1457]: New session 76 of user core. Feb 9 20:10:40.646566 systemd[1]: Started session-76.scope. Feb 9 20:10:40.702846 sshd[2445]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:40.704291 systemd[1]: sshd@79-147.75.49.127:22-139.178.89.65:52912.service: Deactivated successfully. Feb 9 20:10:40.704584 systemd[1]: session-76.scope: Deactivated successfully. Feb 9 20:10:40.704843 systemd-logind[1457]: Session 76 logged out. Waiting for processes to exit. Feb 9 20:10:40.705383 systemd[1]: Started sshd@80-147.75.49.127:22-139.178.89.65:52928.service. Feb 9 20:10:40.705759 systemd-logind[1457]: Removed session 76. Feb 9 20:10:40.719320 sshd[2442]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 20:10:40.735318 sshd[2451]: Accepted publickey for core from 139.178.89.65 port 52928 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:10:40.736232 sshd[2451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:10:40.739396 systemd-logind[1457]: New session 77 of user core. Feb 9 20:10:40.740127 systemd[1]: Started session-77.scope. Feb 9 20:10:40.805854 sshd[2451]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:40.811321 systemd[1]: sshd@80-147.75.49.127:22-139.178.89.65:52928.service: Deactivated successfully. Feb 9 20:10:40.813042 systemd[1]: session-77.scope: Deactivated successfully. Feb 9 20:10:40.814721 systemd-logind[1457]: Session 77 logged out. Waiting for processes to exit. Feb 9 20:10:40.816996 systemd-logind[1457]: Removed session 77. Feb 9 20:10:42.366733 sshd[2442]: Failed password for root from 218.92.0.113 port 19575 ssh2 Feb 9 20:10:46.001356 sshd[2442]: Failed password for root from 218.92.0.113 port 19575 ssh2 Feb 9 20:10:47.163971 sshd[2442]: Received disconnect from 218.92.0.113 port 19575:11: [preauth] Feb 9 20:10:47.163971 sshd[2442]: Disconnected from authenticating user root 218.92.0.113 port 19575 [preauth] Feb 9 20:10:47.164491 sshd[2442]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 20:10:47.166528 systemd[1]: sshd@78-147.75.49.127:22-218.92.0.113:19575.service: Deactivated successfully. Feb 9 20:10:47.341336 systemd[1]: Started sshd@81-147.75.49.127:22-218.92.0.113:26046.service. Feb 9 20:10:48.416888 sshd[2459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 20:10:50.496184 sshd[2459]: Failed password for root from 218.92.0.113 port 26046 ssh2 Feb 9 20:10:50.814142 systemd[1]: Started sshd@82-147.75.49.127:22-139.178.89.65:44452.service. Feb 9 20:10:50.843963 sshd[2462]: Accepted publickey for core from 139.178.89.65 port 44452 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:10:50.844854 sshd[2462]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:10:50.848021 systemd-logind[1457]: New session 78 of user core. Feb 9 20:10:50.848711 systemd[1]: Started session-78.scope. Feb 9 20:10:50.903769 sshd[2462]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:50.905308 systemd[1]: sshd@82-147.75.49.127:22-139.178.89.65:44452.service: Deactivated successfully. Feb 9 20:10:50.905667 systemd[1]: session-78.scope: Deactivated successfully. Feb 9 20:10:50.906076 systemd-logind[1457]: Session 78 logged out. Waiting for processes to exit. Feb 9 20:10:50.906594 systemd[1]: Started sshd@83-147.75.49.127:22-139.178.89.65:44466.service. Feb 9 20:10:50.906936 systemd-logind[1457]: Removed session 78. Feb 9 20:10:50.936682 sshd[2468]: Accepted publickey for core from 139.178.89.65 port 44466 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:10:50.937736 sshd[2468]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:10:50.940996 systemd-logind[1457]: New session 79 of user core. Feb 9 20:10:50.941850 systemd[1]: Started session-79.scope. Feb 9 20:10:50.997012 sshd[2468]: pam_unix(sshd:session): session closed for user core Feb 9 20:10:50.998357 systemd[1]: sshd@83-147.75.49.127:22-139.178.89.65:44466.service: Deactivated successfully. Feb 9 20:10:50.998739 systemd[1]: session-79.scope: Deactivated successfully. Feb 9 20:10:50.999108 systemd-logind[1457]: Session 79 logged out. Waiting for processes to exit. Feb 9 20:10:50.999686 systemd-logind[1457]: Removed session 79. Feb 9 20:10:53.802292 sshd[2459]: Failed password for root from 218.92.0.113 port 26046 ssh2 Feb 9 20:10:56.773150 sshd[2459]: Failed password for root from 218.92.0.113 port 26046 ssh2 Feb 9 20:10:58.096227 sshd[2459]: Received disconnect from 218.92.0.113 port 26046:11: [preauth] Feb 9 20:10:58.096227 sshd[2459]: Disconnected from authenticating user root 218.92.0.113 port 26046 [preauth] Feb 9 20:10:58.096759 sshd[2459]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 20:10:58.098771 systemd[1]: sshd@81-147.75.49.127:22-218.92.0.113:26046.service: Deactivated successfully. Feb 9 20:11:01.006746 systemd[1]: Started sshd@84-147.75.49.127:22-139.178.89.65:58656.service. Feb 9 20:11:01.036683 sshd[2475]: Accepted publickey for core from 139.178.89.65 port 58656 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:01.037570 sshd[2475]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:01.040800 systemd-logind[1457]: New session 80 of user core. Feb 9 20:11:01.041454 systemd[1]: Started session-80.scope. Feb 9 20:11:01.097416 sshd[2475]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:01.098826 systemd[1]: sshd@84-147.75.49.127:22-139.178.89.65:58656.service: Deactivated successfully. Feb 9 20:11:01.099166 systemd[1]: session-80.scope: Deactivated successfully. Feb 9 20:11:01.099524 systemd-logind[1457]: Session 80 logged out. Waiting for processes to exit. Feb 9 20:11:01.100019 systemd[1]: Started sshd@85-147.75.49.127:22-139.178.89.65:58668.service. Feb 9 20:11:01.100450 systemd-logind[1457]: Removed session 80. Feb 9 20:11:01.129839 sshd[2481]: Accepted publickey for core from 139.178.89.65 port 58668 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:01.130654 sshd[2481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:01.133849 systemd-logind[1457]: New session 81 of user core. Feb 9 20:11:01.134552 systemd[1]: Started session-81.scope. Feb 9 20:11:01.190636 sshd[2481]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:01.191778 systemd[1]: sshd@85-147.75.49.127:22-139.178.89.65:58668.service: Deactivated successfully. Feb 9 20:11:01.192189 systemd[1]: session-81.scope: Deactivated successfully. Feb 9 20:11:01.192577 systemd-logind[1457]: Session 81 logged out. Waiting for processes to exit. Feb 9 20:11:01.193143 systemd-logind[1457]: Removed session 81. Feb 9 20:11:11.199731 systemd[1]: Started sshd@86-147.75.49.127:22-139.178.89.65:38064.service. Feb 9 20:11:11.229768 sshd[2488]: Accepted publickey for core from 139.178.89.65 port 38064 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:11.230652 sshd[2488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:11.233803 systemd-logind[1457]: New session 82 of user core. Feb 9 20:11:11.234507 systemd[1]: Started session-82.scope. Feb 9 20:11:11.290298 sshd[2488]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:11.291807 systemd[1]: sshd@86-147.75.49.127:22-139.178.89.65:38064.service: Deactivated successfully. Feb 9 20:11:11.292117 systemd[1]: session-82.scope: Deactivated successfully. Feb 9 20:11:11.292481 systemd-logind[1457]: Session 82 logged out. Waiting for processes to exit. Feb 9 20:11:11.293000 systemd[1]: Started sshd@87-147.75.49.127:22-139.178.89.65:38074.service. Feb 9 20:11:11.293500 systemd-logind[1457]: Removed session 82. Feb 9 20:11:11.323444 sshd[2494]: Accepted publickey for core from 139.178.89.65 port 38074 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:11.324688 sshd[2494]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:11.328595 systemd-logind[1457]: New session 83 of user core. Feb 9 20:11:11.329416 systemd[1]: Started session-83.scope. Feb 9 20:11:11.396797 sshd[2494]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:11.402381 systemd[1]: sshd@87-147.75.49.127:22-139.178.89.65:38074.service: Deactivated successfully. Feb 9 20:11:11.404087 systemd[1]: session-83.scope: Deactivated successfully. Feb 9 20:11:11.405809 systemd-logind[1457]: Session 83 logged out. Waiting for processes to exit. Feb 9 20:11:11.408076 systemd-logind[1457]: Removed session 83. Feb 9 20:11:21.404849 systemd[1]: Started sshd@88-147.75.49.127:22-139.178.89.65:42528.service. Feb 9 20:11:21.434745 sshd[2500]: Accepted publickey for core from 139.178.89.65 port 42528 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:21.435621 sshd[2500]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:21.438649 systemd-logind[1457]: New session 84 of user core. Feb 9 20:11:21.439228 systemd[1]: Started session-84.scope. Feb 9 20:11:21.494297 sshd[2500]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:21.495782 systemd[1]: sshd@88-147.75.49.127:22-139.178.89.65:42528.service: Deactivated successfully. Feb 9 20:11:21.496095 systemd[1]: session-84.scope: Deactivated successfully. Feb 9 20:11:21.496500 systemd-logind[1457]: Session 84 logged out. Waiting for processes to exit. Feb 9 20:11:21.496971 systemd[1]: Started sshd@89-147.75.49.127:22-139.178.89.65:42538.service. Feb 9 20:11:21.497442 systemd-logind[1457]: Removed session 84. Feb 9 20:11:21.527239 sshd[2506]: Accepted publickey for core from 139.178.89.65 port 42538 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:21.528264 sshd[2506]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:21.531684 systemd-logind[1457]: New session 85 of user core. Feb 9 20:11:21.532488 systemd[1]: Started session-85.scope. Feb 9 20:11:21.589097 sshd[2506]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:21.590394 systemd[1]: sshd@89-147.75.49.127:22-139.178.89.65:42538.service: Deactivated successfully. Feb 9 20:11:21.590761 systemd[1]: session-85.scope: Deactivated successfully. Feb 9 20:11:21.591193 systemd-logind[1457]: Session 85 logged out. Waiting for processes to exit. Feb 9 20:11:21.591720 systemd-logind[1457]: Removed session 85. Feb 9 20:11:31.598714 systemd[1]: Started sshd@90-147.75.49.127:22-139.178.89.65:57978.service. Feb 9 20:11:31.628453 sshd[2512]: Accepted publickey for core from 139.178.89.65 port 57978 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:31.629319 sshd[2512]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:31.632443 systemd-logind[1457]: New session 86 of user core. Feb 9 20:11:31.633120 systemd[1]: Started session-86.scope. Feb 9 20:11:31.688378 sshd[2512]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:31.689782 systemd[1]: sshd@90-147.75.49.127:22-139.178.89.65:57978.service: Deactivated successfully. Feb 9 20:11:31.690092 systemd[1]: session-86.scope: Deactivated successfully. Feb 9 20:11:31.690396 systemd-logind[1457]: Session 86 logged out. Waiting for processes to exit. Feb 9 20:11:31.690926 systemd[1]: Started sshd@91-147.75.49.127:22-139.178.89.65:57988.service. Feb 9 20:11:31.691329 systemd-logind[1457]: Removed session 86. Feb 9 20:11:31.721014 sshd[2518]: Accepted publickey for core from 139.178.89.65 port 57988 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:31.722025 sshd[2518]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:31.725305 systemd-logind[1457]: New session 87 of user core. Feb 9 20:11:31.726186 systemd[1]: Started session-87.scope. Feb 9 20:11:31.782328 sshd[2518]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:31.783545 systemd[1]: sshd@91-147.75.49.127:22-139.178.89.65:57988.service: Deactivated successfully. Feb 9 20:11:31.783902 systemd[1]: session-87.scope: Deactivated successfully. Feb 9 20:11:31.784307 systemd-logind[1457]: Session 87 logged out. Waiting for processes to exit. Feb 9 20:11:31.784764 systemd-logind[1457]: Removed session 87. Feb 9 20:11:36.678146 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:11:36.677Z","caller":"v2discovery/discovery.go:361","msg":"error while waiting for peers","discovery-url":"https://discovery.etcd.io","error":"client: etcd cluster is unavailable or misconfigured; error #0: client: etcd member https://discovery.etcd.io returns server error [Gateway Timeout]\n","err-detail":"error #0: client: etcd member https://discovery.etcd.io returns server error [Gateway Timeout]\n"} Feb 9 20:11:36.678146 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:11:36.677Z","caller":"v2discovery/discovery.go:297","msg":"retry connecting to discovery service","url":"https://discovery.etcd.io","reason":"waiting for other nodes","backoff":"2s"} Feb 9 20:11:38.782078 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:11:38.781Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"13cbf5418b8b7270"} Feb 9 20:11:38.782078 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:11:38.781Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":1,"needed-peers":2} Feb 9 20:11:41.792076 systemd[1]: Started sshd@92-147.75.49.127:22-139.178.89.65:52142.service. Feb 9 20:11:41.822219 sshd[2524]: Accepted publickey for core from 139.178.89.65 port 52142 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:41.823109 sshd[2524]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:41.826253 systemd-logind[1457]: New session 88 of user core. Feb 9 20:11:41.826960 systemd[1]: Started session-88.scope. Feb 9 20:11:41.882107 sshd[2524]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:41.883746 systemd[1]: sshd@92-147.75.49.127:22-139.178.89.65:52142.service: Deactivated successfully. Feb 9 20:11:41.884058 systemd[1]: session-88.scope: Deactivated successfully. Feb 9 20:11:41.884366 systemd-logind[1457]: Session 88 logged out. Waiting for processes to exit. Feb 9 20:11:41.884884 systemd[1]: Started sshd@93-147.75.49.127:22-139.178.89.65:52146.service. Feb 9 20:11:41.885228 systemd-logind[1457]: Removed session 88. Feb 9 20:11:41.914908 sshd[2530]: Accepted publickey for core from 139.178.89.65 port 52146 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:41.915799 sshd[2530]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:41.918639 systemd-logind[1457]: New session 89 of user core. Feb 9 20:11:41.919315 systemd[1]: Started session-89.scope. Feb 9 20:11:41.974240 sshd[2530]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:41.975461 systemd[1]: sshd@93-147.75.49.127:22-139.178.89.65:52146.service: Deactivated successfully. Feb 9 20:11:41.975844 systemd[1]: session-89.scope: Deactivated successfully. Feb 9 20:11:41.976250 systemd-logind[1457]: Session 89 logged out. Waiting for processes to exit. Feb 9 20:11:41.976711 systemd-logind[1457]: Removed session 89. Feb 9 20:11:51.270106 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:11:51.269Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"78a48a5698881c45"} Feb 9 20:11:51.270106 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:11:51.269Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Feb 9 20:11:51.984402 systemd[1]: Started sshd@94-147.75.49.127:22-139.178.89.65:59848.service. Feb 9 20:11:52.013888 sshd[2537]: Accepted publickey for core from 139.178.89.65 port 59848 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:52.014766 sshd[2537]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:52.017796 systemd-logind[1457]: New session 90 of user core. Feb 9 20:11:52.018494 systemd[1]: Started session-90.scope. Feb 9 20:11:52.074096 sshd[2537]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:52.075556 systemd[1]: sshd@94-147.75.49.127:22-139.178.89.65:59848.service: Deactivated successfully. Feb 9 20:11:52.075871 systemd[1]: session-90.scope: Deactivated successfully. Feb 9 20:11:52.076271 systemd-logind[1457]: Session 90 logged out. Waiting for processes to exit. Feb 9 20:11:52.076730 systemd[1]: Started sshd@95-147.75.49.127:22-139.178.89.65:59856.service. Feb 9 20:11:52.077201 systemd-logind[1457]: Removed session 90. Feb 9 20:11:52.107540 sshd[2543]: Accepted publickey for core from 139.178.89.65 port 59856 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:11:52.110722 sshd[2543]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:11:52.121027 systemd-logind[1457]: New session 91 of user core. Feb 9 20:11:52.123371 systemd[1]: Started session-91.scope. Feb 9 20:11:52.193223 sshd[2543]: pam_unix(sshd:session): session closed for user core Feb 9 20:11:52.194516 systemd[1]: sshd@95-147.75.49.127:22-139.178.89.65:59856.service: Deactivated successfully. Feb 9 20:11:52.194886 systemd[1]: session-91.scope: Deactivated successfully. Feb 9 20:11:52.195315 systemd-logind[1457]: Session 91 logged out. Waiting for processes to exit. Feb 9 20:11:52.195866 systemd-logind[1457]: Removed session 91. Feb 9 20:12:02.202159 systemd[1]: Started sshd@96-147.75.49.127:22-139.178.89.65:38108.service. Feb 9 20:12:02.232044 sshd[2549]: Accepted publickey for core from 139.178.89.65 port 38108 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:02.232905 sshd[2549]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:02.235962 systemd-logind[1457]: New session 92 of user core. Feb 9 20:12:02.236650 systemd[1]: Started session-92.scope. Feb 9 20:12:02.291063 sshd[2549]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:02.292507 systemd[1]: sshd@96-147.75.49.127:22-139.178.89.65:38108.service: Deactivated successfully. Feb 9 20:12:02.292825 systemd[1]: session-92.scope: Deactivated successfully. Feb 9 20:12:02.293200 systemd-logind[1457]: Session 92 logged out. Waiting for processes to exit. Feb 9 20:12:02.293693 systemd[1]: Started sshd@97-147.75.49.127:22-139.178.89.65:38112.service. Feb 9 20:12:02.294148 systemd-logind[1457]: Removed session 92. Feb 9 20:12:02.323940 sshd[2555]: Accepted publickey for core from 139.178.89.65 port 38112 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:02.324965 sshd[2555]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:02.328273 systemd-logind[1457]: New session 93 of user core. Feb 9 20:12:02.329105 systemd[1]: Started session-93.scope. Feb 9 20:12:02.385076 sshd[2555]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:02.386346 systemd[1]: sshd@97-147.75.49.127:22-139.178.89.65:38112.service: Deactivated successfully. Feb 9 20:12:02.386747 systemd[1]: session-93.scope: Deactivated successfully. Feb 9 20:12:02.387111 systemd-logind[1457]: Session 93 logged out. Waiting for processes to exit. Feb 9 20:12:02.387617 systemd-logind[1457]: Removed session 93. Feb 9 20:12:12.393816 systemd[1]: Started sshd@98-147.75.49.127:22-139.178.89.65:53472.service. Feb 9 20:12:12.423751 sshd[2562]: Accepted publickey for core from 139.178.89.65 port 53472 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:12.424738 sshd[2562]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:12.427900 systemd-logind[1457]: New session 94 of user core. Feb 9 20:12:12.428651 systemd[1]: Started session-94.scope. Feb 9 20:12:12.483877 sshd[2562]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:12.485375 systemd[1]: sshd@98-147.75.49.127:22-139.178.89.65:53472.service: Deactivated successfully. Feb 9 20:12:12.485666 systemd[1]: session-94.scope: Deactivated successfully. Feb 9 20:12:12.485924 systemd-logind[1457]: Session 94 logged out. Waiting for processes to exit. Feb 9 20:12:12.486448 systemd[1]: Started sshd@99-147.75.49.127:22-139.178.89.65:53486.service. Feb 9 20:12:12.486828 systemd-logind[1457]: Removed session 94. Feb 9 20:12:12.516326 sshd[2568]: Accepted publickey for core from 139.178.89.65 port 53486 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:12.517239 sshd[2568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:12.520461 systemd-logind[1457]: New session 95 of user core. Feb 9 20:12:12.521188 systemd[1]: Started session-95.scope. Feb 9 20:12:12.576217 sshd[2568]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:12.577424 systemd[1]: sshd@99-147.75.49.127:22-139.178.89.65:53486.service: Deactivated successfully. Feb 9 20:12:12.577795 systemd[1]: session-95.scope: Deactivated successfully. Feb 9 20:12:12.578184 systemd-logind[1457]: Session 95 logged out. Waiting for processes to exit. Feb 9 20:12:12.578678 systemd-logind[1457]: Removed session 95. Feb 9 20:12:21.213229 systemd[1]: Started sshd@100-147.75.49.127:22-218.92.0.118:64978.service. Feb 9 20:12:22.302729 sshd[2574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 20:12:22.585783 systemd[1]: Started sshd@101-147.75.49.127:22-139.178.89.65:44918.service. Feb 9 20:12:22.615526 sshd[2577]: Accepted publickey for core from 139.178.89.65 port 44918 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:22.616629 sshd[2577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:22.619882 systemd-logind[1457]: New session 96 of user core. Feb 9 20:12:22.620595 systemd[1]: Started session-96.scope. Feb 9 20:12:22.676214 sshd[2577]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:22.677676 systemd[1]: sshd@101-147.75.49.127:22-139.178.89.65:44918.service: Deactivated successfully. Feb 9 20:12:22.677992 systemd[1]: session-96.scope: Deactivated successfully. Feb 9 20:12:22.678309 systemd-logind[1457]: Session 96 logged out. Waiting for processes to exit. Feb 9 20:12:22.678861 systemd[1]: Started sshd@102-147.75.49.127:22-139.178.89.65:44928.service. Feb 9 20:12:22.679267 systemd-logind[1457]: Removed session 96. Feb 9 20:12:22.708787 sshd[2586]: Accepted publickey for core from 139.178.89.65 port 44928 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:22.709677 sshd[2586]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:22.712720 systemd-logind[1457]: New session 97 of user core. Feb 9 20:12:22.713403 systemd[1]: Started session-97.scope. Feb 9 20:12:22.768196 sshd[2586]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:22.769420 systemd[1]: sshd@102-147.75.49.127:22-139.178.89.65:44928.service: Deactivated successfully. Feb 9 20:12:22.769791 systemd[1]: session-97.scope: Deactivated successfully. Feb 9 20:12:22.770175 systemd-logind[1457]: Session 97 logged out. Waiting for processes to exit. Feb 9 20:12:22.770666 systemd-logind[1457]: Removed session 97. Feb 9 20:12:23.618853 sshd[2574]: Failed password for root from 218.92.0.118 port 64978 ssh2 Feb 9 20:12:25.788211 sshd[2574]: Failed password for root from 218.92.0.118 port 64978 ssh2 Feb 9 20:12:28.083658 update_engine[1459]: I0209 20:12:28.083575 1459 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 20:12:28.083658 update_engine[1459]: I0209 20:12:28.083667 1459 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 20:12:28.085488 update_engine[1459]: I0209 20:12:28.085443 1459 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 20:12:28.086435 update_engine[1459]: I0209 20:12:28.086387 1459 omaha_request_params.cc:62] Current group set to lts Feb 9 20:12:28.086786 update_engine[1459]: I0209 20:12:28.086745 1459 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 20:12:28.086786 update_engine[1459]: I0209 20:12:28.086768 1459 update_attempter.cc:643] Scheduling an action processor start. Feb 9 20:12:28.087178 update_engine[1459]: I0209 20:12:28.086810 1459 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 20:12:28.087178 update_engine[1459]: I0209 20:12:28.086894 1459 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 20:12:28.087178 update_engine[1459]: I0209 20:12:28.087117 1459 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 20:12:28.087178 update_engine[1459]: I0209 20:12:28.087145 1459 omaha_request_action.cc:271] Request: Feb 9 20:12:28.087178 update_engine[1459]: Feb 9 20:12:28.087178 update_engine[1459]: Feb 9 20:12:28.087178 update_engine[1459]: Feb 9 20:12:28.087178 update_engine[1459]: Feb 9 20:12:28.087178 update_engine[1459]: Feb 9 20:12:28.087178 update_engine[1459]: Feb 9 20:12:28.087178 update_engine[1459]: Feb 9 20:12:28.087178 update_engine[1459]: Feb 9 20:12:28.087178 update_engine[1459]: I0209 20:12:28.087162 1459 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 20:12:28.089106 locksmithd[1497]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 20:12:28.090883 update_engine[1459]: I0209 20:12:28.090874 1459 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 20:12:28.090977 update_engine[1459]: E0209 20:12:28.090955 1459 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 20:12:28.091013 update_engine[1459]: I0209 20:12:28.091007 1459 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 20:12:29.899771 sshd[2574]: Failed password for root from 218.92.0.118 port 64978 ssh2 Feb 9 20:12:30.457097 sshd[2574]: Received disconnect from 218.92.0.118 port 64978:11: [preauth] Feb 9 20:12:30.457097 sshd[2574]: Disconnected from authenticating user root 218.92.0.118 port 64978 [preauth] Feb 9 20:12:30.457673 sshd[2574]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 20:12:30.459695 systemd[1]: sshd@100-147.75.49.127:22-218.92.0.118:64978.service: Deactivated successfully. Feb 9 20:12:30.617635 systemd[1]: Started sshd@103-147.75.49.127:22-218.92.0.118:15856.service. Feb 9 20:12:31.665205 sshd[2593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 20:12:32.777261 systemd[1]: Started sshd@104-147.75.49.127:22-139.178.89.65:51336.service. Feb 9 20:12:32.806896 sshd[2596]: Accepted publickey for core from 139.178.89.65 port 51336 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:32.807785 sshd[2596]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:32.810665 systemd-logind[1457]: New session 98 of user core. Feb 9 20:12:32.811377 systemd[1]: Started session-98.scope. Feb 9 20:12:32.866049 sshd[2596]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:32.867516 systemd[1]: sshd@104-147.75.49.127:22-139.178.89.65:51336.service: Deactivated successfully. Feb 9 20:12:32.867824 systemd[1]: session-98.scope: Deactivated successfully. Feb 9 20:12:32.868145 systemd-logind[1457]: Session 98 logged out. Waiting for processes to exit. Feb 9 20:12:32.868668 systemd[1]: Started sshd@105-147.75.49.127:22-139.178.89.65:51344.service. Feb 9 20:12:32.869059 systemd-logind[1457]: Removed session 98. Feb 9 20:12:32.898630 sshd[2602]: Accepted publickey for core from 139.178.89.65 port 51344 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:32.899634 sshd[2602]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:32.902877 systemd-logind[1457]: New session 99 of user core. Feb 9 20:12:32.903727 systemd[1]: Started session-99.scope. Feb 9 20:12:32.960199 sshd[2602]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:32.961516 systemd[1]: sshd@105-147.75.49.127:22-139.178.89.65:51344.service: Deactivated successfully. Feb 9 20:12:32.961894 systemd[1]: session-99.scope: Deactivated successfully. Feb 9 20:12:32.962259 systemd-logind[1457]: Session 99 logged out. Waiting for processes to exit. Feb 9 20:12:32.962711 systemd-logind[1457]: Removed session 99. Feb 9 20:12:33.884878 sshd[2593]: Failed password for root from 218.92.0.118 port 15856 ssh2 Feb 9 20:12:36.183218 sshd[2593]: Failed password for root from 218.92.0.118 port 15856 ssh2 Feb 9 20:12:38.083158 update_engine[1459]: I0209 20:12:38.083034 1459 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 20:12:38.084048 update_engine[1459]: I0209 20:12:38.083496 1459 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 20:12:38.084048 update_engine[1459]: E0209 20:12:38.083690 1459 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 20:12:38.084048 update_engine[1459]: I0209 20:12:38.083858 1459 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 20:12:38.816642 sshd[2593]: Failed password for root from 218.92.0.118 port 15856 ssh2 Feb 9 20:12:39.798781 sshd[2593]: Received disconnect from 218.92.0.118 port 15856:11: [preauth] Feb 9 20:12:39.798781 sshd[2593]: Disconnected from authenticating user root 218.92.0.118 port 15856 [preauth] Feb 9 20:12:39.799328 sshd[2593]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 20:12:39.801395 systemd[1]: sshd@103-147.75.49.127:22-218.92.0.118:15856.service: Deactivated successfully. Feb 9 20:12:39.965905 systemd[1]: Started sshd@106-147.75.49.127:22-218.92.0.118:18999.service. Feb 9 20:12:41.017850 sshd[2611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 20:12:42.610146 sshd[2611]: Failed password for root from 218.92.0.118 port 18999 ssh2 Feb 9 20:12:42.969163 systemd[1]: Started sshd@107-147.75.49.127:22-139.178.89.65:47740.service. Feb 9 20:12:42.998934 sshd[2614]: Accepted publickey for core from 139.178.89.65 port 47740 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:42.999845 sshd[2614]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:43.002839 systemd-logind[1457]: New session 100 of user core. Feb 9 20:12:43.003583 systemd[1]: Started session-100.scope. Feb 9 20:12:43.059081 sshd[2614]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:43.060645 systemd[1]: sshd@107-147.75.49.127:22-139.178.89.65:47740.service: Deactivated successfully. Feb 9 20:12:43.060963 systemd[1]: session-100.scope: Deactivated successfully. Feb 9 20:12:43.061273 systemd-logind[1457]: Session 100 logged out. Waiting for processes to exit. Feb 9 20:12:43.061800 systemd[1]: Started sshd@108-147.75.49.127:22-139.178.89.65:47756.service. Feb 9 20:12:43.062204 systemd-logind[1457]: Removed session 100. Feb 9 20:12:43.091411 sshd[2620]: Accepted publickey for core from 139.178.89.65 port 47756 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:43.092267 sshd[2620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:43.095183 systemd-logind[1457]: New session 101 of user core. Feb 9 20:12:43.095826 systemd[1]: Started session-101.scope. Feb 9 20:12:43.150116 sshd[2620]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:43.151379 systemd[1]: sshd@108-147.75.49.127:22-139.178.89.65:47756.service: Deactivated successfully. Feb 9 20:12:43.151754 systemd[1]: session-101.scope: Deactivated successfully. Feb 9 20:12:43.152108 systemd-logind[1457]: Session 101 logged out. Waiting for processes to exit. Feb 9 20:12:43.152629 systemd-logind[1457]: Removed session 101. Feb 9 20:12:46.244156 sshd[2611]: Failed password for root from 218.92.0.118 port 18999 ssh2 Feb 9 20:12:48.083174 update_engine[1459]: I0209 20:12:48.083047 1459 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 20:12:48.083990 update_engine[1459]: I0209 20:12:48.083509 1459 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 20:12:48.083990 update_engine[1459]: E0209 20:12:48.083703 1459 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 20:12:48.083990 update_engine[1459]: I0209 20:12:48.083869 1459 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 20:12:49.546389 sshd[2611]: Failed password for root from 218.92.0.118 port 18999 ssh2 Feb 9 20:12:50.684518 sshd[2611]: Received disconnect from 218.92.0.118 port 18999:11: [preauth] Feb 9 20:12:50.684518 sshd[2611]: Disconnected from authenticating user root 218.92.0.118 port 18999 [preauth] Feb 9 20:12:50.685056 sshd[2611]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 20:12:50.687071 systemd[1]: sshd@106-147.75.49.127:22-218.92.0.118:18999.service: Deactivated successfully. Feb 9 20:12:53.159789 systemd[1]: Started sshd@109-147.75.49.127:22-139.178.89.65:53192.service. Feb 9 20:12:53.189848 sshd[2627]: Accepted publickey for core from 139.178.89.65 port 53192 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:53.190735 sshd[2627]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:53.193861 systemd-logind[1457]: New session 102 of user core. Feb 9 20:12:53.194594 systemd[1]: Started session-102.scope. Feb 9 20:12:53.250282 sshd[2627]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:53.251831 systemd[1]: sshd@109-147.75.49.127:22-139.178.89.65:53192.service: Deactivated successfully. Feb 9 20:12:53.252142 systemd[1]: session-102.scope: Deactivated successfully. Feb 9 20:12:53.252449 systemd-logind[1457]: Session 102 logged out. Waiting for processes to exit. Feb 9 20:12:53.252969 systemd[1]: Started sshd@110-147.75.49.127:22-139.178.89.65:53196.service. Feb 9 20:12:53.253359 systemd-logind[1457]: Removed session 102. Feb 9 20:12:53.282693 sshd[2633]: Accepted publickey for core from 139.178.89.65 port 53196 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:12:53.283675 sshd[2633]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:12:53.286866 systemd-logind[1457]: New session 103 of user core. Feb 9 20:12:53.287713 systemd[1]: Started session-103.scope. Feb 9 20:12:53.321797 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.320Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"9f00f7782e3ec5fa"} Feb 9 20:12:53.321797 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.320Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3} Feb 9 20:12:53.326387 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.325Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"13cbf5418b8b7270","cluster-id":"3ccb73da7f12dc83"} Feb 9 20:12:53.326387 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.326Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 switched to configuration voters=()"} Feb 9 20:12:53.326755 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.326Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 became follower at term 0"} Feb 9 20:12:53.326755 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.326Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 13cbf5418b8b7270 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 9 20:12:53.326755 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.326Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 became follower at term 1"} Feb 9 20:12:53.326755 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.326Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 switched to configuration voters=(1426503368855745136)"} Feb 9 20:12:53.326755 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.326Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 switched to configuration voters=(1426503368855745136 8693225285262777413)"} Feb 9 20:12:53.326755 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.326Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 switched to configuration voters=(1426503368855745136 8693225285262777413 11457429547574543866)"} Feb 9 20:12:53.327253 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:12:53.327Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 9 20:12:53.327737 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.327Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 9 20:12:53.328131 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.327Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 9 20:12:53.328388 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.328Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"78a48a5698881c45"} Feb 9 20:12:53.328388 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.328Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"13cbf5418b8b7270","remote-peer-id":"78a48a5698881c45"} Feb 9 20:12:53.328671 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.328Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"13cbf5418b8b7270","remote-peer-id":"78a48a5698881c45"} Feb 9 20:12:53.328726 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.328Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"13cbf5418b8b7270","remote-peer-id":"78a48a5698881c45"} Feb 9 20:12:53.328784 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.328Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"78a48a5698881c45"} Feb 9 20:12:53.328784 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.328Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"13cbf5418b8b7270","remote-peer-id":"78a48a5698881c45"} Feb 9 20:12:53.328847 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.328Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"13cbf5418b8b7270","remote-peer-id":"78a48a5698881c45","remote-peer-urls":["http://10.67.80.17:2380"]} Feb 9 20:12:53.328847 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.328Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"13cbf5418b8b7270","remote-peer-id":"78a48a5698881c45"} Feb 9 20:12:53.328847 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.328Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.328847 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.328Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"13cbf5418b8b7270","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.329148 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.329Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"13cbf5418b8b7270","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.329393 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.329Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"13cbf5418b8b7270","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.329819 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.329Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.329819 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.329Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"13cbf5418b8b7270","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.329819 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.329Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"13cbf5418b8b7270","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.329943 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.329Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"13cbf5418b8b7270","remote-peer-id":"9f00f7782e3ec5fa","remote-peer-urls":["http://10.67.80.11:2380"]} Feb 9 20:12:53.329943 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.329Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"13cbf5418b8b7270","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 9 20:12:53.330009 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.329Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Feb 9 20:12:53.330044 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.330Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 switched to configuration voters=(1426503368855745136 8693225285262777413 11457429547574543866)"} Feb 9 20:12:53.330089 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.330Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"3ccb73da7f12dc83","local-member-id":"13cbf5418b8b7270","added-peer-id":"13cbf5418b8b7270","added-peer-peer-urls":["http://10.67.80.13:2380"]} Feb 9 20:12:53.330127 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.330Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 switched to configuration voters=(1426503368855745136 8693225285262777413 11457429547574543866)"} Feb 9 20:12:53.330158 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.330Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"3ccb73da7f12dc83","local-member-id":"13cbf5418b8b7270","added-peer-id":"78a48a5698881c45","added-peer-peer-urls":["http://10.67.80.17:2380"]} Feb 9 20:12:53.330191 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.330Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 switched to configuration voters=(1426503368855745136 8693225285262777413 11457429547574543866)"} Feb 9 20:12:53.330217 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.330Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"3ccb73da7f12dc83","local-member-id":"13cbf5418b8b7270","added-peer-id":"9f00f7782e3ec5fa","added-peer-peer-urls":["http://10.67.80.11:2380"]} Feb 9 20:12:53.330975 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.330Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"13cbf5418b8b7270","initial-advertise-peer-urls":["http://10.67.80.13:2380"],"listen-peer-urls":["http://10.67.80.13:2380"],"advertise-client-urls":["http://10.67.80.13:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 9 20:12:53.330975 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.330Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.13:2380"} Feb 9 20:12:53.330975 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.330Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.13:2380"} Feb 9 20:12:53.338374 sshd[2633]: pam_unix(sshd:session): session closed for user core Feb 9 20:12:53.339676 systemd[1]: sshd@110-147.75.49.127:22-139.178.89.65:53196.service: Deactivated successfully. Feb 9 20:12:53.340090 systemd[1]: session-103.scope: Deactivated successfully. Feb 9 20:12:53.340521 systemd-logind[1457]: Session 103 logged out. Waiting for processes to exit. Feb 9 20:12:53.341124 systemd-logind[1457]: Removed session 103. Feb 9 20:12:53.515538 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.515Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"13cbf5418b8b7270","to":"9f00f7782e3ec5fa","stream-type":"stream Message"} Feb 9 20:12:53.515538 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.515Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.515538 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.515Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"13cbf5418b8b7270","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.515538 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.515Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"13cbf5418b8b7270","to":"9f00f7782e3ec5fa","stream-type":"stream MsgApp v2"} Feb 9 20:12:53.515538 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.515Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"13cbf5418b8b7270","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.517477 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.517Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"13cbf5418b8b7270","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:53.517477 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:53.517Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"13cbf5418b8b7270","remote-peer-id":"9f00f7782e3ec5fa"} Feb 9 20:12:55.009425 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:55.008Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 9f00f7782e3ec5fa [logterm: 1, index: 3] at term 1"} Feb 9 20:12:55.010852 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:55.010Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 [term: 1] received a MsgVote message with higher term from 9f00f7782e3ec5fa [term: 2]"} Feb 9 20:12:55.010852 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:55.010Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 became follower at term 2"} Feb 9 20:12:55.010852 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:55.010Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"13cbf5418b8b7270 [logterm: 1, index: 3, vote: 0] cast MsgVote for 9f00f7782e3ec5fa [logterm: 1, index: 3] at term 2"} Feb 9 20:12:55.012186 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:55.011Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 13cbf5418b8b7270 elected leader 9f00f7782e3ec5fa at term 2"} Feb 9 20:12:55.015571 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:55.015Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"13cbf5418b8b7270","local-member-attributes":"{Name:09d486f734094cc7951ce5f46efc35aa ClientURLs:[http://10.67.80.13:2379]}","request-path":"/0/members/13cbf5418b8b7270/attributes","cluster-id":"3ccb73da7f12dc83","publish-timeout":"7s"} Feb 9 20:12:55.015571 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:55.015Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 9 20:12:55.016105 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:55.015Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 9 20:12:55.016105 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:55.015Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 9 20:12:55.016149 systemd[1]: Started etcd-member.service. Feb 9 20:12:55.016986 systemd[1]: Reached target multi-user.target. Feb 9 20:12:55.017620 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:55.017Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 9 20:12:55.020442 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 20:12:55.024272 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 20:12:55.024353 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 20:12:55.024477 systemd[1]: Startup finished in 2.242s (kernel) + 16.627s (initrd) + 8min 37.077s (userspace) = 8min 55.947s. Feb 9 20:12:57.025679 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:57.025Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"3ccb73da7f12dc83","local-member-id":"13cbf5418b8b7270","cluster-version":"3.0"} Feb 9 20:12:57.025679 etcd-wrapper[1711]: {"level":"info","ts":"2024-02-09T20:12:57.025Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.0"} Feb 9 20:12:58.082063 update_engine[1459]: I0209 20:12:58.081974 1459 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 20:12:58.083233 update_engine[1459]: I0209 20:12:58.082536 1459 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 20:12:58.083233 update_engine[1459]: E0209 20:12:58.082795 1459 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 20:12:58.083233 update_engine[1459]: I0209 20:12:58.083061 1459 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 20:12:58.083233 update_engine[1459]: I0209 20:12:58.083091 1459 omaha_request_action.cc:621] Omaha request response: Feb 9 20:12:58.083906 update_engine[1459]: E0209 20:12:58.083266 1459 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 20:12:58.083906 update_engine[1459]: I0209 20:12:58.083307 1459 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 20:12:58.083906 update_engine[1459]: I0209 20:12:58.083324 1459 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 20:12:58.083906 update_engine[1459]: I0209 20:12:58.083338 1459 update_attempter.cc:306] Processing Done. Feb 9 20:12:58.083906 update_engine[1459]: E0209 20:12:58.083374 1459 update_attempter.cc:619] Update failed. Feb 9 20:12:58.083906 update_engine[1459]: I0209 20:12:58.083388 1459 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 20:12:58.083906 update_engine[1459]: I0209 20:12:58.083405 1459 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 20:12:58.083906 update_engine[1459]: I0209 20:12:58.083420 1459 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 20:12:58.083906 update_engine[1459]: I0209 20:12:58.083644 1459 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 20:12:58.083906 update_engine[1459]: I0209 20:12:58.083719 1459 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 20:12:58.083906 update_engine[1459]: I0209 20:12:58.083735 1459 omaha_request_action.cc:271] Request: Feb 9 20:12:58.083906 update_engine[1459]: Feb 9 20:12:58.083906 update_engine[1459]: Feb 9 20:12:58.083906 update_engine[1459]: Feb 9 20:12:58.083906 update_engine[1459]: Feb 9 20:12:58.083906 update_engine[1459]: Feb 9 20:12:58.083906 update_engine[1459]: Feb 9 20:12:58.083906 update_engine[1459]: I0209 20:12:58.083750 1459 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 20:12:58.085991 update_engine[1459]: I0209 20:12:58.084180 1459 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 20:12:58.085991 update_engine[1459]: E0209 20:12:58.084412 1459 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 20:12:58.085991 update_engine[1459]: I0209 20:12:58.084611 1459 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 20:12:58.085991 update_engine[1459]: I0209 20:12:58.084635 1459 omaha_request_action.cc:621] Omaha request response: Feb 9 20:12:58.085991 update_engine[1459]: I0209 20:12:58.084652 1459 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 20:12:58.085991 update_engine[1459]: I0209 20:12:58.084666 1459 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 20:12:58.085991 update_engine[1459]: I0209 20:12:58.084679 1459 update_attempter.cc:306] Processing Done. Feb 9 20:12:58.085991 update_engine[1459]: I0209 20:12:58.084692 1459 update_attempter.cc:310] Error event sent. Feb 9 20:12:58.085991 update_engine[1459]: I0209 20:12:58.084721 1459 update_check_scheduler.cc:74] Next update check in 45m39s Feb 9 20:12:58.086458 locksmithd[1497]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 20:12:58.086458 locksmithd[1497]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 20:12:58.330594 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:12:58.330Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s"} Feb 9 20:12:58.330594 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:12:58.330Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s"} Feb 9 20:13:03.331166 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:03.330Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:03.331166 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:03.330Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:03.347336 systemd[1]: Started sshd@111-147.75.49.127:22-139.178.89.65:36094.service. Feb 9 20:13:03.377607 sshd[2642]: Accepted publickey for core from 139.178.89.65 port 36094 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:13:03.380736 sshd[2642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:13:03.390782 systemd-logind[1457]: New session 104 of user core. Feb 9 20:13:03.393634 systemd[1]: Started session-104.scope. Feb 9 20:13:03.462557 sshd[2642]: pam_unix(sshd:session): session closed for user core Feb 9 20:13:03.464148 systemd[1]: sshd@111-147.75.49.127:22-139.178.89.65:36094.service: Deactivated successfully. Feb 9 20:13:03.464459 systemd[1]: session-104.scope: Deactivated successfully. Feb 9 20:13:03.464764 systemd-logind[1457]: Session 104 logged out. Waiting for processes to exit. Feb 9 20:13:03.465342 systemd[1]: Started sshd@112-147.75.49.127:22-139.178.89.65:36106.service. Feb 9 20:13:03.465784 systemd-logind[1457]: Removed session 104. Feb 9 20:13:03.495555 sshd[2648]: Accepted publickey for core from 139.178.89.65 port 36106 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:13:03.498701 sshd[2648]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:13:03.509133 systemd-logind[1457]: New session 105 of user core. Feb 9 20:13:03.511535 systemd[1]: Started session-105.scope. Feb 9 20:13:03.579993 sshd[2648]: pam_unix(sshd:session): session closed for user core Feb 9 20:13:03.581480 systemd[1]: sshd@112-147.75.49.127:22-139.178.89.65:36106.service: Deactivated successfully. Feb 9 20:13:03.581819 systemd[1]: session-105.scope: Deactivated successfully. Feb 9 20:13:03.582237 systemd-logind[1457]: Session 105 logged out. Waiting for processes to exit. Feb 9 20:13:03.582721 systemd[1]: Started sshd@113-147.75.49.127:22-139.178.89.65:36110.service. Feb 9 20:13:03.583217 systemd-logind[1457]: Removed session 105. Feb 9 20:13:03.612723 sshd[2654]: Accepted publickey for core from 139.178.89.65 port 36110 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:13:03.613765 sshd[2654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:13:03.617288 systemd-logind[1457]: New session 106 of user core. Feb 9 20:13:03.618026 systemd[1]: Started session-106.scope. Feb 9 20:13:03.684544 sshd[2654]: pam_unix(sshd:session): session closed for user core Feb 9 20:13:03.691159 systemd[1]: sshd@113-147.75.49.127:22-139.178.89.65:36110.service: Deactivated successfully. Feb 9 20:13:03.692739 systemd[1]: session-106.scope: Deactivated successfully. Feb 9 20:13:03.694399 systemd-logind[1457]: Session 106 logged out. Waiting for processes to exit. Feb 9 20:13:03.696931 systemd[1]: Started sshd@114-147.75.49.127:22-139.178.89.65:36114.service. Feb 9 20:13:03.699354 systemd-logind[1457]: Removed session 106. Feb 9 20:13:03.752085 sshd[2660]: Accepted publickey for core from 139.178.89.65 port 36114 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:13:03.752746 sshd[2660]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:13:03.754942 systemd-logind[1457]: New session 107 of user core. Feb 9 20:13:03.755416 systemd[1]: Started session-107.scope. Feb 9 20:13:03.833856 sudo[2663]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 20:13:03.834496 sudo[2663]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 20:13:03.854507 dbus-daemon[1429]: \xd0M\xb8\xe4\x80U: received setenforce notice (enforcing=-941826240) Feb 9 20:13:03.859560 sudo[2663]: pam_unix(sudo:session): session closed for user root Feb 9 20:13:03.865643 sshd[2660]: pam_unix(sshd:session): session closed for user core Feb 9 20:13:03.872685 systemd[1]: sshd@114-147.75.49.127:22-139.178.89.65:36114.service: Deactivated successfully. Feb 9 20:13:03.874369 systemd[1]: session-107.scope: Deactivated successfully. Feb 9 20:13:03.876139 systemd-logind[1457]: Session 107 logged out. Waiting for processes to exit. Feb 9 20:13:03.878887 systemd[1]: Started sshd@115-147.75.49.127:22-139.178.89.65:36118.service. Feb 9 20:13:03.881367 systemd-logind[1457]: Removed session 107. Feb 9 20:13:03.947703 sshd[2667]: Accepted publickey for core from 139.178.89.65 port 36118 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:13:03.950739 sshd[2667]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:13:03.960995 systemd-logind[1457]: New session 108 of user core. Feb 9 20:13:03.963383 systemd[1]: Started session-108.scope. Feb 9 20:13:04.037411 sudo[2671]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 20:13:04.037517 sudo[2671]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 20:13:04.039189 sudo[2671]: pam_unix(sudo:session): session closed for user root Feb 9 20:13:04.041416 sudo[2670]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 20:13:04.041521 sudo[2670]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 20:13:04.046654 systemd[1]: Stopping audit-rules.service... Feb 9 20:13:04.046000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 20:13:04.047521 auditctl[2674]: No rules Feb 9 20:13:04.047700 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 20:13:04.047796 systemd[1]: Stopped audit-rules.service. Feb 9 20:13:04.048598 systemd[1]: Starting audit-rules.service... Feb 9 20:13:04.052971 kernel: kauditd_printk_skb: 111 callbacks suppressed Feb 9 20:13:04.053014 kernel: audit: type=1305 audit(1707509584.046:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 20:13:04.058906 augenrules[2691]: No rules Feb 9 20:13:04.059244 systemd[1]: Finished audit-rules.service. Feb 9 20:13:04.059798 sudo[2670]: pam_unix(sudo:session): session closed for user root Feb 9 20:13:04.060671 sshd[2667]: pam_unix(sshd:session): session closed for user core Feb 9 20:13:04.062250 systemd[1]: sshd@115-147.75.49.127:22-139.178.89.65:36118.service: Deactivated successfully. Feb 9 20:13:04.062680 systemd[1]: session-108.scope: Deactivated successfully. Feb 9 20:13:04.063132 systemd-logind[1457]: Session 108 logged out. Waiting for processes to exit. Feb 9 20:13:04.063771 systemd-logind[1457]: Removed session 108. Feb 9 20:13:04.046000 audit[2674]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1d239970 a2=420 a3=0 items=0 ppid=1 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:13:04.099483 kernel: audit: type=1300 audit(1707509584.046:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1d239970 a2=420 a3=0 items=0 ppid=1 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:13:04.099510 kernel: audit: type=1327 audit(1707509584.046:164): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 20:13:04.046000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 20:13:04.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:13:04.131539 kernel: audit: type=1131 audit(1707509584.046:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:13:04.131567 kernel: audit: type=1130 audit(1707509584.058:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:13:04.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:13:04.154005 kernel: audit: type=1106 audit(1707509584.058:167): pid=2670 uid=500 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 20:13:04.058000 audit[2670]: USER_END pid=2670 uid=500 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 20:13:04.180171 kernel: audit: type=1104 audit(1707509584.058:168): pid=2670 uid=500 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 20:13:04.058000 audit[2670]: CRED_DISP pid=2670 uid=500 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 20:13:04.203882 kernel: audit: type=1106 audit(1707509584.060:169): pid=2667 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 20:13:04.060000 audit[2667]: USER_END pid=2667 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 20:13:04.236089 kernel: audit: type=1104 audit(1707509584.060:170): pid=2667 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 20:13:04.060000 audit[2667]: CRED_DISP pid=2667 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 20:13:04.262055 kernel: audit: type=1131 audit(1707509584.061:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.49.127:22-139.178.89.65:36118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:13:04.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.49.127:22-139.178.89.65:36118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:13:08.331302 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:08.330Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:08.331302 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:08.330Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:13.331503 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:13.330Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:13.331503 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:13.331Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:18.332609 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:18.332Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:18.332609 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:18.332Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:23.333779 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:23.333Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:23.333779 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:23.333Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:28.334489 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:28.333Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:28.334489 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:28.333Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:33.334560 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:33.334Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:33.334560 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:33.334Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:38.335671 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:38.335Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:38.335671 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:38.335Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:43.335819 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:43.335Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:43.335819 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:43.335Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:48.336603 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:48.336Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:48.336603 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:48.336Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:53.337736 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:53.337Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:53.337736 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:53.337Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:58.337946 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:58.337Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:13:58.337946 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:13:58.337Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:01.291020 systemd[1]: Started sshd@116-147.75.49.127:22-218.92.0.112:56783.service. Feb 9 20:14:01.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.49.127:22-218.92.0.112:56783 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:01.316920 kernel: audit: type=1130 audit(1707509641.290:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.49.127:22-218.92.0.112:56783 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:02.488850 sshd[2697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:14:02.488000 audit[2697]: USER_AUTH pid=2697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:02.566101 kernel: audit: type=1100 audit(1707509642.488:173): pid=2697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:03.338725 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:03.338Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:03.338725 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:03.338Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:04.533137 sshd[2697]: Failed password for root from 218.92.0.112 port 56783 ssh2 Feb 9 20:14:05.734000 audit[2697]: USER_AUTH pid=2697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:05.813966 kernel: audit: type=1100 audit(1707509645.734:174): pid=2697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:07.859579 sshd[2697]: Failed password for root from 218.92.0.112 port 56783 ssh2 Feb 9 20:14:08.339818 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:08.339Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:08.339818 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:08.339Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:08.981000 audit[2697]: USER_AUTH pid=2697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:09.064107 kernel: audit: type=1100 audit(1707509648.981:175): pid=2697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:11.517177 sshd[2697]: Failed password for root from 218.92.0.112 port 56783 ssh2 Feb 9 20:14:12.228365 sshd[2697]: Received disconnect from 218.92.0.112 port 56783:11: [preauth] Feb 9 20:14:12.228365 sshd[2697]: Disconnected from authenticating user root 218.92.0.112 port 56783 [preauth] Feb 9 20:14:12.228883 sshd[2697]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:14:12.230943 systemd[1]: sshd@116-147.75.49.127:22-218.92.0.112:56783.service: Deactivated successfully. Feb 9 20:14:12.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.49.127:22-218.92.0.112:56783 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:12.318094 kernel: audit: type=1131 audit(1707509652.230:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.49.127:22-218.92.0.112:56783 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:12.380713 systemd[1]: Started sshd@117-147.75.49.127:22-218.92.0.112:21857.service. Feb 9 20:14:12.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.127:22-218.92.0.112:21857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:12.469919 kernel: audit: type=1130 audit(1707509652.380:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.127:22-218.92.0.112:21857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:13.340307 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:13.339Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:13.340307 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:13.339Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:13.459843 sshd[2701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:14:13.459000 audit[2701]: USER_AUTH pid=2701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:13.549972 kernel: audit: type=1100 audit(1707509653.459:178): pid=2701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:15.348377 sshd[2701]: Failed password for root from 218.92.0.112 port 21857 ssh2 Feb 9 20:14:16.685000 audit[2701]: USER_AUTH pid=2701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:16.778094 kernel: audit: type=1100 audit(1707509656.685:179): pid=2701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:18.341517 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:18.340Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:18.341517 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:18.341Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:18.654565 sshd[2701]: Failed password for root from 218.92.0.112 port 21857 ssh2 Feb 9 20:14:19.911000 audit[2701]: USER_AUTH pid=2701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:20.003954 kernel: audit: type=1100 audit(1707509659.911:180): pid=2701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:22.292403 sshd[2701]: Failed password for root from 218.92.0.112 port 21857 ssh2 Feb 9 20:14:23.138067 sshd[2701]: Received disconnect from 218.92.0.112 port 21857:11: [preauth] Feb 9 20:14:23.138067 sshd[2701]: Disconnected from authenticating user root 218.92.0.112 port 21857 [preauth] Feb 9 20:14:23.138616 sshd[2701]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:14:23.140631 systemd[1]: sshd@117-147.75.49.127:22-218.92.0.112:21857.service: Deactivated successfully. Feb 9 20:14:23.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.127:22-218.92.0.112:21857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:23.235110 kernel: audit: type=1131 audit(1707509663.140:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.127:22-218.92.0.112:21857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:23.305094 systemd[1]: Started sshd@118-147.75.49.127:22-218.92.0.112:30518.service. Feb 9 20:14:23.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.127:22-218.92.0.112:30518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:23.341619 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:23.341Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:23.341619 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:23.341Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:23.397918 kernel: audit: type=1130 audit(1707509663.304:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.127:22-218.92.0.112:30518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:24.384782 sshd[2705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:14:24.384000 audit[2705]: USER_AUTH pid=2705 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:24.477109 kernel: audit: type=1100 audit(1707509664.384:183): pid=2705 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:26.449160 sshd[2705]: Failed password for root from 218.92.0.112 port 30518 ssh2 Feb 9 20:14:27.610000 audit[2705]: USER_AUTH pid=2705 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:27.703089 kernel: audit: type=1100 audit(1707509667.610:184): pid=2705 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:28.342637 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:28.341Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:28.342637 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:28.342Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:30.423046 sshd[2705]: Failed password for root from 218.92.0.112 port 30518 ssh2 Feb 9 20:14:30.837000 audit[2705]: USER_AUTH pid=2705 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:30.931100 kernel: audit: type=1100 audit(1707509670.837:185): pid=2705 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:14:32.726675 sshd[2705]: Failed password for root from 218.92.0.112 port 30518 ssh2 Feb 9 20:14:33.343645 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:33.343Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:33.343645 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:33.343Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:34.064681 sshd[2705]: Received disconnect from 218.92.0.112 port 30518:11: [preauth] Feb 9 20:14:34.064681 sshd[2705]: Disconnected from authenticating user root 218.92.0.112 port 30518 [preauth] Feb 9 20:14:34.065219 sshd[2705]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:14:34.067235 systemd[1]: sshd@118-147.75.49.127:22-218.92.0.112:30518.service: Deactivated successfully. Feb 9 20:14:34.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.127:22-218.92.0.112:30518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:34.161102 kernel: audit: type=1131 audit(1707509674.066:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.127:22-218.92.0.112:30518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:14:38.344630 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:38.344Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:38.344630 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:38.344Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:43.345611 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:43.345Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:43.345611 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:43.345Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:48.346608 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:48.346Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:48.346608 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:48.346Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:53.347380 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:53.346Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:53.347380 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:53.346Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:58.348048 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:58.347Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:14:58.348048 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:14:58.347Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:03.348363 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:03.347Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:03.348363 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:03.347Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:08.348898 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:08.348Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:08.348898 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:08.348Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:13.349622 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:13.349Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:13.349622 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:13.349Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:18.350506 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:18.349Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:18.350506 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:18.349Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:23.351573 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:23.350Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:23.351573 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:23.351Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:28.352601 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:28.352Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:28.352601 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:28.352Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:33.353050 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:33.352Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:33.353050 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:33.352Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:38.353767 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:38.353Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:38.353767 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:38.353Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:43.354732 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:43.354Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:43.354732 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:43.354Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:48.355580 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:48.354Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:48.355580 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:48.355Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:53.356234 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:53.355Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:53.356234 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:53.355Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:58.357160 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:58.356Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:15:58.357160 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:15:58.356Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:03.358009 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:03.357Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:03.358009 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:03.357Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:08.358688 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:08.358Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:08.358688 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:08.358Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:13.358956 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:13.358Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:13.358956 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:13.358Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:18.360024 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:18.359Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:18.360024 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:18.359Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:23.360260 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:23.359Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:23.360260 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:23.359Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:28.360755 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:28.360Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:28.360755 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:28.360Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:33.361720 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:33.361Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:33.361720 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:33.361Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:38.362572 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:38.361Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:38.362572 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:38.362Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:43.363880 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:43.363Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:43.363880 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:43.363Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:48.364941 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:48.364Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:48.364941 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:48.364Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:53.365593 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:53.364Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:53.365593 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:53.364Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:58.365887 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:58.365Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:16:58.365887 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:16:58.365Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:03.366947 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:03.366Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:03.366947 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:03.366Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:08.368021 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:08.367Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:08.368021 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:08.367Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:13.369173 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:13.368Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:13.369173 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:13.368Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:18.369844 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:18.369Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:18.369844 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:18.369Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:23.370081 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:23.369Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:23.370081 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:23.369Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:28.370910 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:28.370Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:28.370910 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:28.370Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:33.372103 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:33.371Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:33.372103 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:33.371Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:38.373253 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:38.372Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:38.373253 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:38.372Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:43.373810 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:43.373Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:43.373810 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:43.373Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:48.374077 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:48.373Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:48.374077 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:48.373Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:53.374886 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:53.374Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:53.374886 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:53.374Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:58.375766 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:58.375Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:17:58.375766 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:17:58.375Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:03.376928 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:03.376Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:03.376928 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:03.376Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:08.377956 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:08.377Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:08.377956 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:08.377Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:13.378615 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:13.377Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:13.378615 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:13.378Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:18.379049 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:18.378Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:18.379049 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:18.378Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:23.379265 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:23.378Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:23.379265 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:23.378Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:28.380280 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:28.379Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:28.380280 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:28.379Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:33.380709 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:33.380Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:33.380709 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:33.380Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:38.381162 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:38.380Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:38.381162 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:38.380Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:43.381506 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:43.380Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:43.381506 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:43.380Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:48.382630 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:48.381Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:48.382630 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:48.382Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:53.383053 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:53.382Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:53.383053 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:53.382Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:58.384202 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:58.383Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:18:58.384202 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:18:58.383Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:03.384962 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:03.384Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:03.384962 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:03.384Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:08.385139 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:08.384Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:08.385139 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:08.384Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:13.386414 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:13.385Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:13.386414 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:13.385Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:14.461274 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 9 20:19:14.467656 systemd-tmpfiles[2716]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 20:19:14.467875 systemd-tmpfiles[2716]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 20:19:14.468565 systemd-tmpfiles[2716]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 20:19:14.479467 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 9 20:19:14.479555 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 9 20:19:14.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:19:14.480422 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 9 20:19:14.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:19:14.658060 kernel: audit: type=1130 audit(1707509954.478:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:19:14.658092 kernel: audit: type=1131 audit(1707509954.478:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:19:18.387154 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:18.386Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:18.387154 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:18.386Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:23.387707 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:23.387Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:23.387707 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:23.387Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:28.388689 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:28.388Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:28.388689 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:28.388Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:33.389088 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:33.388Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:33.389088 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:33.388Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:38.389583 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:38.388Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:38.389583 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:38.389Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:43.390029 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:43.389Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:43.390029 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:43.389Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:48.390596 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:48.390Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:48.390596 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:48.390Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:53.391502 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:53.390Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:53.391502 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:53.390Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:58.391937 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:58.391Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:19:58.391937 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:19:58.391Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:03.392268 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:03.391Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:03.392268 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:03.391Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:08.393378 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:08.392Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:08.393378 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:08.392Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:13.394408 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:13.393Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:13.394408 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:13.393Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:18.395592 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:18.395Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:18.395592 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:18.395Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:23.396078 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:23.395Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:23.396078 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:23.395Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:28.396637 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:28.396Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:28.396637 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:28.396Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:33.397498 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:33.396Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:33.397498 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:33.396Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:38.398683 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:38.398Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:38.398683 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:38.398Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:43.398963 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:43.398Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:43.398963 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:43.398Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:48.400161 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:48.399Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:48.400161 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:48.399Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:53.401177 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:53.400Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:53.401177 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:53.400Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:58.401655 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:58.401Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:20:58.401655 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:20:58.401Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:03.402463 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:03.401Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:03.402463 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:03.401Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:08.402988 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:08.402Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:08.402988 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:08.402Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:13.403636 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:13.403Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:13.403636 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:13.403Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:18.404515 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:18.403Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:18.404515 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:18.404Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:23.405259 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:23.404Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:23.405259 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:23.404Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:28.405979 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:28.405Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:28.405979 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:28.405Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:33.407160 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:33.406Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:33.407160 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:33.406Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:38.407627 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:38.407Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:38.407627 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:38.407Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:43.408434 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:43.407Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:43.408434 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:43.407Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:48.409099 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:48.408Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:48.409099 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:48.408Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:53.410263 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:53.409Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:53.410263 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:53.409Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:58.411467 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:58.410Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:21:58.411467 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:21:58.410Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:03.411959 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:03.411Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:03.411959 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:03.411Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:08.412728 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:08.412Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:08.412728 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:08.412Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:13.413227 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:13.412Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:13.413227 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:13.412Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:18.413663 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:18.413Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:18.413663 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:18.413Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:23.414834 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:23.414Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:23.414834 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:23.414Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:28.415323 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:28.414Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:28.415323 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:28.414Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:29.660941 systemd[1]: Started sshd@119-147.75.49.127:22-218.92.0.45:55554.service. Feb 9 20:22:29.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.127:22-218.92.0.45:55554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:22:29.753919 kernel: audit: type=1130 audit(1707510149.660:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.127:22-218.92.0.45:55554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:22:29.823003 sshd[2721]: Unable to negotiate with 218.92.0.45 port 55554: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 20:22:29.823587 systemd[1]: sshd@119-147.75.49.127:22-218.92.0.45:55554.service: Deactivated successfully. Feb 9 20:22:29.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.127:22-218.92.0.45:55554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:22:29.915103 kernel: audit: type=1131 audit(1707510149.822:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.127:22-218.92.0.45:55554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:22:33.415911 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:33.415Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:33.415911 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:33.415Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:38.416069 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:38.415Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:38.416069 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:38.415Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:43.400408 systemd[1]: Started sshd@120-147.75.49.127:22-218.92.0.29:47987.service. Feb 9 20:22:43.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.49.127:22-218.92.0.29:47987 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:22:43.416652 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:43.416Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:43.416652 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:43.416Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:43.492112 kernel: audit: type=1130 audit(1707510163.399:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.49.127:22-218.92.0.29:47987 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:22:44.431231 sshd[2729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 20:22:44.430000 audit[2729]: USER_AUTH pid=2729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:22:44.525101 kernel: audit: type=1100 audit(1707510164.430:192): pid=2729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:22:46.138173 sshd[2729]: Failed password for root from 218.92.0.29 port 47987 ssh2 Feb 9 20:22:47.648000 audit[2729]: USER_AUTH pid=2729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:22:47.742115 kernel: audit: type=1100 audit(1707510167.648:193): pid=2729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:22:48.417603 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:48.417Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:48.417603 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:48.417Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:49.101225 sshd[2729]: Failed password for root from 218.92.0.29 port 47987 ssh2 Feb 9 20:22:49.335000 audit[2729]: USER_AUTH pid=2729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:22:49.429116 kernel: audit: type=1100 audit(1707510169.335:194): pid=2729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:22:50.728228 sshd[2729]: Failed password for root from 218.92.0.29 port 47987 ssh2 Feb 9 20:22:51.025694 sshd[2729]: Received disconnect from 218.92.0.29 port 47987:11: [preauth] Feb 9 20:22:51.025694 sshd[2729]: Disconnected from authenticating user root 218.92.0.29 port 47987 [preauth] Feb 9 20:22:51.026159 sshd[2729]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 20:22:51.028190 systemd[1]: sshd@120-147.75.49.127:22-218.92.0.29:47987.service: Deactivated successfully. Feb 9 20:22:51.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.49.127:22-218.92.0.29:47987 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:22:51.122107 kernel: audit: type=1131 audit(1707510171.027:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.49.127:22-218.92.0.29:47987 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:22:53.418362 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:53.417Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:53.418362 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:53.417Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:58.418825 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:58.418Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:22:58.418825 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:22:58.418Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:01.177536 systemd[1]: Started sshd@121-147.75.49.127:22-218.92.0.29:61507.service. Feb 9 20:23:01.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.49.127:22-218.92.0.29:61507 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:23:01.271114 kernel: audit: type=1130 audit(1707510181.176:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.49.127:22-218.92.0.29:61507 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:23:02.150470 sshd[2733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 20:23:02.149000 audit[2733]: USER_AUTH pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:02.243089 kernel: audit: type=1100 audit(1707510182.149:197): pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:03.419676 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:03.419Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:03.419676 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:03.419Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:04.661317 sshd[2733]: Failed password for root from 218.92.0.29 port 61507 ssh2 Feb 9 20:23:05.357000 audit[2733]: ANOM_LOGIN_FAILURES pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 20:23:05.359994 sshd[2733]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 20:23:05.358000 audit[2733]: USER_AUTH pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:05.515355 kernel: audit: type=2100 audit(1707510185.357:198): pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 20:23:05.515390 kernel: audit: type=1100 audit(1707510185.358:199): pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:07.283400 sshd[2733]: Failed password for root from 218.92.0.29 port 61507 ssh2 Feb 9 20:23:08.420038 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:08.419Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:08.420038 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:08.419Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:08.569000 audit[2733]: USER_AUTH pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:08.663200 kernel: audit: type=1100 audit(1707510188.569:200): pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:10.238100 sshd[2733]: Failed password for root from 218.92.0.29 port 61507 ssh2 Feb 9 20:23:11.781905 sshd[2733]: Received disconnect from 218.92.0.29 port 61507:11: [preauth] Feb 9 20:23:11.781905 sshd[2733]: Disconnected from authenticating user root 218.92.0.29 port 61507 [preauth] Feb 9 20:23:11.782449 sshd[2733]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 20:23:11.784556 systemd[1]: sshd@121-147.75.49.127:22-218.92.0.29:61507.service: Deactivated successfully. Feb 9 20:23:11.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.49.127:22-218.92.0.29:61507 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:23:11.878110 kernel: audit: type=1131 audit(1707510191.784:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.49.127:22-218.92.0.29:61507 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:23:11.927982 systemd[1]: Started sshd@122-147.75.49.127:22-218.92.0.29:32269.service. Feb 9 20:23:11.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.127:22-218.92.0.29:32269 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:23:12.020919 kernel: audit: type=1130 audit(1707510191.927:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.127:22-218.92.0.29:32269 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:23:12.906124 sshd[2737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 20:23:12.905000 audit[2737]: USER_AUTH pid=2737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:12.997976 kernel: audit: type=1100 audit(1707510192.905:203): pid=2737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:13.421257 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:13.420Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:13.421257 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:13.420Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:14.789668 sshd[2737]: Failed password for root from 218.92.0.29 port 32269 ssh2 Feb 9 20:23:16.114000 audit[2737]: USER_AUTH pid=2737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:16.206107 kernel: audit: type=1100 audit(1707510196.114:204): pid=2737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:18.421666 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:18.421Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:18.421666 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:18.421Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:18.550111 sshd[2737]: Failed password for root from 218.92.0.29 port 32269 ssh2 Feb 9 20:23:19.699000 audit[2737]: USER_AUTH pid=2737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:19.791106 kernel: audit: type=1100 audit(1707510199.699:205): pid=2737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 20:23:21.211749 sshd[2737]: Failed password for root from 218.92.0.29 port 32269 ssh2 Feb 9 20:23:21.749176 sshd[2737]: Received disconnect from 218.92.0.29 port 32269:11: [preauth] Feb 9 20:23:21.749176 sshd[2737]: Disconnected from authenticating user root 218.92.0.29 port 32269 [preauth] Feb 9 20:23:21.749649 sshd[2737]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 20:23:21.751665 systemd[1]: sshd@122-147.75.49.127:22-218.92.0.29:32269.service: Deactivated successfully. Feb 9 20:23:21.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.127:22-218.92.0.29:32269 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:23:21.846115 kernel: audit: type=1131 audit(1707510201.751:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.127:22-218.92.0.29:32269 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:23:23.422547 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:23.421Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:23.422547 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:23.422Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:28.423662 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:28.423Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:28.423662 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:28.423Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:33.424413 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:33.423Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:33.424413 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:33.423Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:38.424640 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:38.423Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:38.424640 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:38.424Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:43.425222 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:43.424Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:43.425222 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:43.424Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:48.426451 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:48.425Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:48.426451 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:48.425Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:53.426781 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:53.426Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:53.426781 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:53.426Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:58.427660 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:58.427Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:23:58.427660 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:23:58.427Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:03.427881 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:03.427Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:03.427881 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:03.427Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:08.428679 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:08.428Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:08.428679 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:08.428Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:13.429395 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:13.428Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:13.429395 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:13.428Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:18.430140 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:18.429Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:18.430140 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:18.429Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:23.430732 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:23.430Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:23.430732 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:23.430Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:28.431550 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:28.430Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:28.431550 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:28.430Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:33.432472 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:33.431Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:33.432472 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:33.431Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:34.898395 systemd[1]: Started sshd@123-147.75.49.127:22-141.98.11.107:57386.service. Feb 9 20:24:34.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.127:22-141.98.11.107:57386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:24:34.992126 kernel: audit: type=1130 audit(1707510274.897:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.127:22-141.98.11.107:57386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:24:35.066762 sshd[2744]: Received disconnect from 141.98.11.107 port 57386:11: Normal Shutdown [preauth] Feb 9 20:24:35.066762 sshd[2744]: Disconnected from 141.98.11.107 port 57386 [preauth] Feb 9 20:24:35.068646 systemd[1]: sshd@123-147.75.49.127:22-141.98.11.107:57386.service: Deactivated successfully. Feb 9 20:24:35.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.127:22-141.98.11.107:57386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:24:35.168111 kernel: audit: type=1131 audit(1707510275.068:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.127:22-141.98.11.107:57386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:24:37.557140 systemd[1]: Started sshd@124-147.75.49.127:22-85.209.11.226:43402.service. Feb 9 20:24:37.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.49.127:22-85.209.11.226:43402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:24:37.651120 kernel: audit: type=1130 audit(1707510277.556:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.49.127:22-85.209.11.226:43402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:24:38.433262 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:38.432Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:38.433262 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:38.432Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:38.523935 sshd[2749]: Invalid user remote from 85.209.11.226 port 43402 Feb 9 20:24:38.530020 sshd[2749]: pam_faillock(sshd:auth): User unknown Feb 9 20:24:38.531083 sshd[2749]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:24:38.531171 sshd[2749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.226 Feb 9 20:24:38.532152 sshd[2749]: pam_faillock(sshd:auth): User unknown Feb 9 20:24:38.531000 audit[2749]: USER_AUTH pid=2749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="remote" exe="/usr/sbin/sshd" hostname=85.209.11.226 addr=85.209.11.226 terminal=ssh res=failed' Feb 9 20:24:38.625978 kernel: audit: type=1100 audit(1707510278.531:210): pid=2749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="remote" exe="/usr/sbin/sshd" hostname=85.209.11.226 addr=85.209.11.226 terminal=ssh res=failed' Feb 9 20:24:40.556026 sshd[2749]: Failed password for invalid user remote from 85.209.11.226 port 43402 ssh2 Feb 9 20:24:42.047039 sshd[2749]: Received disconnect from 85.209.11.226 port 43402:11: Client disconnecting normally [preauth] Feb 9 20:24:42.047039 sshd[2749]: Disconnected from invalid user remote 85.209.11.226 port 43402 [preauth] Feb 9 20:24:42.049558 systemd[1]: sshd@124-147.75.49.127:22-85.209.11.226:43402.service: Deactivated successfully. Feb 9 20:24:42.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.49.127:22-85.209.11.226:43402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:24:42.142974 kernel: audit: type=1131 audit(1707510282.049:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.49.127:22-85.209.11.226:43402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:24:43.434130 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:43.433Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:43.434130 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:43.433Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:48.435319 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:48.434Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:48.435319 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:48.434Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:53.436548 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:53.435Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:53.436548 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:53.435Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:58.437431 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:58.436Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:24:58.437431 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:24:58.436Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:03.438498 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:03.437Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:03.438498 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:03.437Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:08.439623 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:08.439Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:08.439623 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:08.439Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:13.440646 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:13.440Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:13.440646 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:13.440Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:18.441066 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:18.440Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:18.441066 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:18.440Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:23.441377 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:23.440Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:23.441377 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:23.440Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:28.442582 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:28.441Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:28.442582 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:28.442Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:33.443024 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:33.442Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:33.443024 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:33.442Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:38.444010 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:38.443Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:38.444010 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:38.443Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:43.444888 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:43.444Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:43.444888 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:43.444Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:48.445701 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:48.445Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:48.445701 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:48.445Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:53.446177 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:53.445Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:53.446177 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:53.445Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:58.446975 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:58.446Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:25:58.446975 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:25:58.446Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:03.447265 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:03.446Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:03.447265 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:03.446Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:08.447551 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:08.447Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:08.447551 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:08.447Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:13.448107 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:13.447Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:13.448107 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:13.447Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:18.449320 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:18.448Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:18.449320 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:18.448Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:23.450200 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:23.449Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:23.450200 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:23.449Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:28.451096 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:28.450Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:28.451096 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:28.450Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:33.452149 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:33.451Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:33.452149 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:33.451Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:38.452473 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:38.451Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:38.452473 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:38.451Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:43.453404 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:43.452Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:43.453404 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:43.452Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:48.454056 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:48.453Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:48.454056 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:48.453Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:53.455431 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:53.454Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:53.455431 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:53.454Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:58.455485 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:58.454Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:26:58.455485 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:26:58.454Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:03.455645 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:03.455Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:03.455645 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:03.455Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:08.456530 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:08.455Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:08.456530 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:08.455Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:13.457266 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:13.456Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:13.457266 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:13.456Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:18.457460 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:18.456Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:18.457460 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:18.456Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:23.458358 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:23.457Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:23.458358 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:23.457Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:28.459473 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:28.458Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:28.459473 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:28.458Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:33.459964 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:33.459Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:33.459964 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:33.459Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:38.460128 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:38.459Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:38.460128 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:38.459Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:43.460583 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:43.459Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:43.460583 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:43.460Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:48.461655 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:48.460Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:48.461655 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:48.461Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:53.462542 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:53.461Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:53.462542 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:53.462Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:58.463683 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:58.463Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:27:58.463683 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:27:58.463Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:03.464906 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:03.464Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:03.464906 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:03.464Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:08.465828 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:08.465Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:08.465828 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:08.465Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:13.466498 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:13.465Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:13.466498 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:13.465Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:17.261249 systemd[1]: Started sshd@125-147.75.49.127:22-61.177.172.179:39993.service. Feb 9 20:28:17.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.127:22-61.177.172.179:39993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:17.354954 kernel: audit: type=1130 audit(1707510497.260:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.127:22-61.177.172.179:39993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:18.314170 sshd[2757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 20:28:18.313000 audit[2757]: USER_AUTH pid=2757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:18.406099 kernel: audit: type=1100 audit(1707510498.313:213): pid=2757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:18.466758 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:18.466Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:18.466758 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:18.466Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:20.872290 sshd[2757]: Failed password for root from 61.177.172.179 port 39993 ssh2 Feb 9 20:28:21.535000 audit[2757]: USER_AUTH pid=2757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:21.630106 kernel: audit: type=1100 audit(1707510501.535:214): pid=2757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:23.467287 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:23.466Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:23.467287 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:23.466Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:23.841445 sshd[2757]: Failed password for root from 61.177.172.179 port 39993 ssh2 Feb 9 20:28:24.758000 audit[2757]: USER_AUTH pid=2757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:24.853003 kernel: audit: type=1100 audit(1707510504.758:215): pid=2757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:26.812769 sshd[2757]: Failed password for root from 61.177.172.179 port 39993 ssh2 Feb 9 20:28:27.717107 systemd[1]: Started sshd@126-147.75.49.127:22-218.92.0.112:42306.service. Feb 9 20:28:27.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.127:22-218.92.0.112:42306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:27.809981 kernel: audit: type=1130 audit(1707510507.716:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.127:22-218.92.0.112:42306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:27.981494 sshd[2757]: Received disconnect from 61.177.172.179 port 39993:11: [preauth] Feb 9 20:28:27.981494 sshd[2757]: Disconnected from authenticating user root 61.177.172.179 port 39993 [preauth] Feb 9 20:28:27.981911 sshd[2757]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 20:28:27.983965 systemd[1]: sshd@125-147.75.49.127:22-61.177.172.179:39993.service: Deactivated successfully. Feb 9 20:28:27.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.127:22-61.177.172.179:39993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:28.077111 kernel: audit: type=1131 audit(1707510507.983:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.127:22-61.177.172.179:39993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:28.158648 systemd[1]: Started sshd@127-147.75.49.127:22-61.177.172.179:63438.service. Feb 9 20:28:28.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.127:22-61.177.172.179:63438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:28.251919 kernel: audit: type=1130 audit(1707510508.157:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.127:22-61.177.172.179:63438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:28.468097 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:28.467Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:28.468097 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:28.467Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:28.763191 sshd[2760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:28:28.762000 audit[2760]: USER_AUTH pid=2760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:28.856097 kernel: audit: type=1100 audit(1707510508.762:219): pid=2760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:29.258516 sshd[2766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 20:28:29.257000 audit[2766]: ANOM_LOGIN_FAILURES pid=2766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:29.258761 sshd[2766]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 20:28:29.258000 audit[2766]: USER_AUTH pid=2766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:29.415521 kernel: audit: type=2100 audit(1707510509.257:220): pid=2766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:29.415553 kernel: audit: type=1100 audit(1707510509.258:221): pid=2766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:30.696481 sshd[2760]: Failed password for root from 218.92.0.112 port 42306 ssh2 Feb 9 20:28:30.996315 sshd[2766]: Failed password for root from 61.177.172.179 port 63438 ssh2 Feb 9 20:28:31.984000 audit[2760]: USER_AUTH pid=2760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:32.077095 kernel: audit: type=1100 audit(1707510511.984:222): pid=2760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:32.487000 audit[2766]: USER_AUTH pid=2766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:32.581992 kernel: audit: type=1100 audit(1707510512.487:223): pid=2766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:33.468394 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:33.467Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:33.468394 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:33.467Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:34.329504 sshd[2760]: Failed password for root from 218.92.0.112 port 42306 ssh2 Feb 9 20:28:34.637821 sshd[2766]: Failed password for root from 61.177.172.179 port 63438 ssh2 Feb 9 20:28:35.206000 audit[2760]: USER_AUTH pid=2760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:35.297917 kernel: audit: type=1100 audit(1707510515.206:224): pid=2760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:35.717000 audit[2766]: USER_AUTH pid=2766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:35.812111 kernel: audit: type=1100 audit(1707510515.717:225): pid=2766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:36.768643 sshd[2760]: Failed password for root from 218.92.0.112 port 42306 ssh2 Feb 9 20:28:37.280436 sshd[2766]: Failed password for root from 61.177.172.179 port 63438 ssh2 Feb 9 20:28:38.428330 sshd[2760]: Received disconnect from 218.92.0.112 port 42306:11: [preauth] Feb 9 20:28:38.428330 sshd[2760]: Disconnected from authenticating user root 218.92.0.112 port 42306 [preauth] Feb 9 20:28:38.428886 sshd[2760]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:28:38.430837 systemd[1]: sshd@126-147.75.49.127:22-218.92.0.112:42306.service: Deactivated successfully. Feb 9 20:28:38.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.127:22-218.92.0.112:42306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:38.469046 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:38.468Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:38.469046 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:38.468Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:38.524036 kernel: audit: type=1131 audit(1707510518.430:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.127:22-218.92.0.112:42306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:38.577068 systemd[1]: Started sshd@128-147.75.49.127:22-218.92.0.112:11352.service. Feb 9 20:28:38.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.127:22-218.92.0.112:11352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:38.670091 kernel: audit: type=1130 audit(1707510518.575:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.127:22-218.92.0.112:11352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:38.948292 sshd[2766]: Received disconnect from 61.177.172.179 port 63438:11: [preauth] Feb 9 20:28:38.948292 sshd[2766]: Disconnected from authenticating user root 61.177.172.179 port 63438 [preauth] Feb 9 20:28:38.948832 sshd[2766]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 20:28:38.950802 systemd[1]: sshd@127-147.75.49.127:22-61.177.172.179:63438.service: Deactivated successfully. Feb 9 20:28:38.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.127:22-61.177.172.179:63438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:39.045000 kernel: audit: type=1131 audit(1707510518.950:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.127:22-61.177.172.179:63438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:39.108804 systemd[1]: Started sshd@129-147.75.49.127:22-61.177.172.179:22750.service. Feb 9 20:28:39.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.127:22-61.177.172.179:22750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:39.201971 kernel: audit: type=1130 audit(1707510519.106:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.127:22-61.177.172.179:22750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:39.589341 sshd[2770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:28:39.587000 audit[2770]: USER_AUTH pid=2770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:39.681988 kernel: audit: type=1100 audit(1707510519.587:230): pid=2770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:40.180211 sshd[2774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 20:28:40.178000 audit[2774]: USER_AUTH pid=2774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:40.272964 kernel: audit: type=1100 audit(1707510520.178:231): pid=2774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:41.367117 sshd[2770]: Failed password for root from 218.92.0.112 port 11352 ssh2 Feb 9 20:28:42.093560 sshd[2774]: Failed password for root from 61.177.172.179 port 22750 ssh2 Feb 9 20:28:42.803000 audit[2770]: USER_AUTH pid=2770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:42.898004 kernel: audit: type=1100 audit(1707510522.803:232): pid=2770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:43.403000 audit[2774]: USER_AUTH pid=2774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:43.469645 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:43.469Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:43.469645 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:43.469Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:43.498981 kernel: audit: type=1100 audit(1707510523.403:233): pid=2774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:44.993944 sshd[2770]: Failed password for root from 218.92.0.112 port 11352 ssh2 Feb 9 20:28:46.020000 audit[2770]: USER_AUTH pid=2770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:46.066053 sshd[2774]: Failed password for root from 61.177.172.179 port 22750 ssh2 Feb 9 20:28:46.112959 kernel: audit: type=1100 audit(1707510526.020:234): pid=2770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:46.630000 audit[2774]: USER_AUTH pid=2774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:46.723999 kernel: audit: type=1100 audit(1707510526.630:235): pid=2774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 20:28:48.094349 sshd[2770]: Failed password for root from 218.92.0.112 port 11352 ssh2 Feb 9 20:28:48.470234 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:48.469Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:48.470234 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:48.469Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:48.704413 sshd[2774]: Failed password for root from 61.177.172.179 port 22750 ssh2 Feb 9 20:28:49.236085 sshd[2770]: Received disconnect from 218.92.0.112 port 11352:11: [preauth] Feb 9 20:28:49.236085 sshd[2770]: Disconnected from authenticating user root 218.92.0.112 port 11352 [preauth] Feb 9 20:28:49.236631 sshd[2770]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:28:49.238597 systemd[1]: sshd@128-147.75.49.127:22-218.92.0.112:11352.service: Deactivated successfully. Feb 9 20:28:49.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.127:22-218.92.0.112:11352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:49.332063 kernel: audit: type=1131 audit(1707510529.238:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.127:22-218.92.0.112:11352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:49.411675 systemd[1]: Started sshd@130-147.75.49.127:22-218.92.0.112:27349.service. Feb 9 20:28:49.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.127:22-218.92.0.112:27349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:49.503032 kernel: audit: type=1130 audit(1707510529.410:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.127:22-218.92.0.112:27349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:49.856430 sshd[2774]: Received disconnect from 61.177.172.179 port 22750:11: [preauth] Feb 9 20:28:49.856430 sshd[2774]: Disconnected from authenticating user root 61.177.172.179 port 22750 [preauth] Feb 9 20:28:49.856989 sshd[2774]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 20:28:49.858935 systemd[1]: sshd@129-147.75.49.127:22-61.177.172.179:22750.service: Deactivated successfully. Feb 9 20:28:49.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.127:22-61.177.172.179:22750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:49.952984 kernel: audit: type=1131 audit(1707510529.858:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.127:22-61.177.172.179:22750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:50.487948 sshd[2778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:28:50.487000 audit[2778]: USER_AUTH pid=2778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:50.579990 kernel: audit: type=1100 audit(1707510530.487:239): pid=2778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:51.774119 sshd[2778]: Failed password for root from 218.92.0.112 port 27349 ssh2 Feb 9 20:28:52.181000 audit[2778]: USER_AUTH pid=2778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:52.275124 kernel: audit: type=1100 audit(1707510532.181:240): pid=2778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:53.470579 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:53.469Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:53.470579 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:53.470Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:53.743385 sshd[2778]: Failed password for root from 218.92.0.112 port 27349 ssh2 Feb 9 20:28:55.408000 audit[2778]: USER_AUTH pid=2778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:55.501102 kernel: audit: type=1100 audit(1707510535.408:241): pid=2778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 20:28:58.049169 sshd[2778]: Failed password for root from 218.92.0.112 port 27349 ssh2 Feb 9 20:28:58.471534 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:58.470Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:58.471534 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:28:58.471Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:28:58.634343 sshd[2778]: Received disconnect from 218.92.0.112 port 27349:11: [preauth] Feb 9 20:28:58.634343 sshd[2778]: Disconnected from authenticating user root 218.92.0.112 port 27349 [preauth] Feb 9 20:28:58.634868 sshd[2778]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 20:28:58.636885 systemd[1]: sshd@130-147.75.49.127:22-218.92.0.112:27349.service: Deactivated successfully. Feb 9 20:28:58.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.127:22-218.92.0.112:27349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:28:58.731010 kernel: audit: type=1131 audit(1707510538.636:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.127:22-218.92.0.112:27349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:29:03.472658 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:03.472Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:03.472658 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:03.472Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:08.473662 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:08.473Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:08.473662 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:08.473Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:13.474757 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:13.474Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:13.474757 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:13.474Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:18.475315 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:18.474Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:18.475315 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:18.474Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:23.475957 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:23.475Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:23.475957 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:23.475Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:28.476150 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:28.475Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:28.476150 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:28.475Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:33.476443 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:33.475Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:33.476443 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:33.475Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:38.477327 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:38.476Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:38.477327 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:38.476Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:43.478426 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:43.477Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:43.478426 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:43.477Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:48.478750 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:48.478Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:48.478750 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:48.478Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:53.480162 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:53.479Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:53.480162 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:53.479Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:58.480562 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:58.479Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:29:58.480562 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:29:58.480Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:03.481084 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:03.480Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:03.481084 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:03.480Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:08.481716 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:08.481Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:08.481716 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:08.481Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:13.482726 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:13.482Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:13.482726 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:13.482Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:18.483846 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:18.483Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:18.483846 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:18.483Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:23.484383 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:23.483Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:23.484383 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:23.483Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:28.485253 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:28.484Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:28.485253 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:28.484Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:33.486376 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:33.485Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:33.486376 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:33.485Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:38.487522 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:38.486Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 20:30:38.487522 etcd-wrapper[1711]: {"level":"warn","ts":"2024-02-09T20:30:38.486Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"78a48a5698881c45","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"}