Feb 9 20:58:12.544879 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 9 20:58:12.544891 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 20:58:12.544899 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 20:58:12.544903 kernel: BIOS-provided physical RAM map: Feb 9 20:58:12.544907 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 20:58:12.544911 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 20:58:12.544915 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 20:58:12.544920 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 20:58:12.544923 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 20:58:12.544928 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000062c36fff] usable Feb 9 20:58:12.544932 kernel: BIOS-e820: [mem 0x0000000062c37000-0x0000000062c37fff] ACPI NVS Feb 9 20:58:12.544936 kernel: BIOS-e820: [mem 0x0000000062c38000-0x0000000062c38fff] reserved Feb 9 20:58:12.544940 kernel: BIOS-e820: [mem 0x0000000062c39000-0x000000006c0c6fff] usable Feb 9 20:58:12.544944 kernel: BIOS-e820: [mem 0x000000006c0c7000-0x000000006d1a9fff] reserved Feb 9 20:58:12.544949 kernel: BIOS-e820: [mem 0x000000006d1aa000-0x000000006d332fff] usable Feb 9 20:58:12.544954 kernel: BIOS-e820: [mem 0x000000006d333000-0x000000006d764fff] ACPI NVS Feb 9 20:58:12.544959 kernel: BIOS-e820: [mem 0x000000006d765000-0x000000006fffefff] reserved Feb 9 20:58:12.544963 kernel: BIOS-e820: [mem 0x000000006ffff000-0x000000006fffffff] usable Feb 9 20:58:12.544967 kernel: BIOS-e820: [mem 0x0000000070000000-0x000000007b7fffff] reserved Feb 9 20:58:12.544971 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 20:58:12.544976 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 20:58:12.544980 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 20:58:12.544984 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 20:58:12.544989 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 20:58:12.544993 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000008837fffff] usable Feb 9 20:58:12.544998 kernel: NX (Execute Disable) protection: active Feb 9 20:58:12.545002 kernel: SMBIOS 3.2.1 present. Feb 9 20:58:12.545007 kernel: DMI: Supermicro X11SCH-F/X11SCH-F, BIOS 1.5 11/17/2020 Feb 9 20:58:12.545011 kernel: tsc: Detected 3400.000 MHz processor Feb 9 20:58:12.545015 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 20:58:12.545020 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 20:58:12.545024 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 20:58:12.545029 kernel: last_pfn = 0x883800 max_arch_pfn = 0x400000000 Feb 9 20:58:12.545033 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 20:58:12.545038 kernel: last_pfn = 0x70000 max_arch_pfn = 0x400000000 Feb 9 20:58:12.545042 kernel: Using GB pages for direct mapping Feb 9 20:58:12.545047 kernel: ACPI: Early table checksum verification disabled Feb 9 20:58:12.545052 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 20:58:12.545056 kernel: ACPI: XSDT 0x000000006D6460C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 20:58:12.545061 kernel: ACPI: FACP 0x000000006D682620 000114 (v06 01072009 AMI 00010013) Feb 9 20:58:12.545067 kernel: ACPI: DSDT 0x000000006D646268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 20:58:12.545072 kernel: ACPI: FACS 0x000000006D764F80 000040 Feb 9 20:58:12.545078 kernel: ACPI: APIC 0x000000006D682738 00012C (v04 01072009 AMI 00010013) Feb 9 20:58:12.545083 kernel: ACPI: FPDT 0x000000006D682868 000044 (v01 01072009 AMI 00010013) Feb 9 20:58:12.545087 kernel: ACPI: FIDT 0x000000006D6828B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 20:58:12.545092 kernel: ACPI: MCFG 0x000000006D682950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 20:58:12.545097 kernel: ACPI: SPMI 0x000000006D682990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 20:58:12.545102 kernel: ACPI: SSDT 0x000000006D6829D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 20:58:12.545107 kernel: ACPI: SSDT 0x000000006D6844F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 20:58:12.545112 kernel: ACPI: SSDT 0x000000006D6876C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 20:58:12.545117 kernel: ACPI: HPET 0x000000006D6899F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 20:58:12.545122 kernel: ACPI: SSDT 0x000000006D689A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 20:58:12.545127 kernel: ACPI: SSDT 0x000000006D68A9D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 20:58:12.545131 kernel: ACPI: UEFI 0x000000006D68B2D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 20:58:12.545136 kernel: ACPI: LPIT 0x000000006D68B318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 20:58:12.545141 kernel: ACPI: SSDT 0x000000006D68B3B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 20:58:12.545146 kernel: ACPI: SSDT 0x000000006D68DB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 20:58:12.545151 kernel: ACPI: DBGP 0x000000006D68F078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 20:58:12.545156 kernel: ACPI: DBG2 0x000000006D68F0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 20:58:12.545161 kernel: ACPI: SSDT 0x000000006D68F108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 20:58:12.545166 kernel: ACPI: DMAR 0x000000006D690C70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 9 20:58:12.545170 kernel: ACPI: SSDT 0x000000006D690D18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 20:58:12.545175 kernel: ACPI: TPM2 0x000000006D690E60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 20:58:12.545180 kernel: ACPI: SSDT 0x000000006D690E98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 20:58:12.545185 kernel: ACPI: WSMT 0x000000006D691C28 000028 (v01 \xbcb 01072009 AMI 00010013) Feb 9 20:58:12.545190 kernel: ACPI: EINJ 0x000000006D691C50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 20:58:12.545196 kernel: ACPI: ERST 0x000000006D691D80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 20:58:12.545200 kernel: ACPI: BERT 0x000000006D691FB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 20:58:12.545205 kernel: ACPI: HEST 0x000000006D691FE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 20:58:12.545210 kernel: ACPI: SSDT 0x000000006D692260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 20:58:12.545215 kernel: ACPI: Reserving FACP table memory at [mem 0x6d682620-0x6d682733] Feb 9 20:58:12.545220 kernel: ACPI: Reserving DSDT table memory at [mem 0x6d646268-0x6d68261e] Feb 9 20:58:12.545224 kernel: ACPI: Reserving FACS table memory at [mem 0x6d764f80-0x6d764fbf] Feb 9 20:58:12.545229 kernel: ACPI: Reserving APIC table memory at [mem 0x6d682738-0x6d682863] Feb 9 20:58:12.545234 kernel: ACPI: Reserving FPDT table memory at [mem 0x6d682868-0x6d6828ab] Feb 9 20:58:12.545239 kernel: ACPI: Reserving FIDT table memory at [mem 0x6d6828b0-0x6d68294b] Feb 9 20:58:12.545244 kernel: ACPI: Reserving MCFG table memory at [mem 0x6d682950-0x6d68298b] Feb 9 20:58:12.545249 kernel: ACPI: Reserving SPMI table memory at [mem 0x6d682990-0x6d6829d0] Feb 9 20:58:12.545254 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6829d8-0x6d6844f3] Feb 9 20:58:12.545258 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6844f8-0x6d6876bd] Feb 9 20:58:12.545263 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6876c0-0x6d6899ea] Feb 9 20:58:12.545268 kernel: ACPI: Reserving HPET table memory at [mem 0x6d6899f0-0x6d689a27] Feb 9 20:58:12.545273 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d689a28-0x6d68a9d5] Feb 9 20:58:12.545277 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68a9d8-0x6d68b2ce] Feb 9 20:58:12.545283 kernel: ACPI: Reserving UEFI table memory at [mem 0x6d68b2d0-0x6d68b311] Feb 9 20:58:12.545288 kernel: ACPI: Reserving LPIT table memory at [mem 0x6d68b318-0x6d68b3ab] Feb 9 20:58:12.545292 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68b3b0-0x6d68db8d] Feb 9 20:58:12.545297 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68db90-0x6d68f071] Feb 9 20:58:12.545302 kernel: ACPI: Reserving DBGP table memory at [mem 0x6d68f078-0x6d68f0ab] Feb 9 20:58:12.545307 kernel: ACPI: Reserving DBG2 table memory at [mem 0x6d68f0b0-0x6d68f103] Feb 9 20:58:12.545311 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68f108-0x6d690c6e] Feb 9 20:58:12.545316 kernel: ACPI: Reserving DMAR table memory at [mem 0x6d690c70-0x6d690d17] Feb 9 20:58:12.545321 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690d18-0x6d690e5b] Feb 9 20:58:12.545327 kernel: ACPI: Reserving TPM2 table memory at [mem 0x6d690e60-0x6d690e93] Feb 9 20:58:12.545331 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690e98-0x6d691c26] Feb 9 20:58:12.545336 kernel: ACPI: Reserving WSMT table memory at [mem 0x6d691c28-0x6d691c4f] Feb 9 20:58:12.545341 kernel: ACPI: Reserving EINJ table memory at [mem 0x6d691c50-0x6d691d7f] Feb 9 20:58:12.545346 kernel: ACPI: Reserving ERST table memory at [mem 0x6d691d80-0x6d691faf] Feb 9 20:58:12.545354 kernel: ACPI: Reserving BERT table memory at [mem 0x6d691fb0-0x6d691fdf] Feb 9 20:58:12.545360 kernel: ACPI: Reserving HEST table memory at [mem 0x6d691fe0-0x6d69225b] Feb 9 20:58:12.545365 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d692260-0x6d6923c1] Feb 9 20:58:12.545388 kernel: No NUMA configuration found Feb 9 20:58:12.545394 kernel: Faking a node at [mem 0x0000000000000000-0x00000008837fffff] Feb 9 20:58:12.545399 kernel: NODE_DATA(0) allocated [mem 0x8837fa000-0x8837fffff] Feb 9 20:58:12.545404 kernel: Zone ranges: Feb 9 20:58:12.545409 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 20:58:12.545427 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 20:58:12.545432 kernel: Normal [mem 0x0000000100000000-0x00000008837fffff] Feb 9 20:58:12.545437 kernel: Movable zone start for each node Feb 9 20:58:12.545442 kernel: Early memory node ranges Feb 9 20:58:12.545447 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 20:58:12.545452 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 20:58:12.545457 kernel: node 0: [mem 0x0000000040400000-0x0000000062c36fff] Feb 9 20:58:12.545462 kernel: node 0: [mem 0x0000000062c39000-0x000000006c0c6fff] Feb 9 20:58:12.545467 kernel: node 0: [mem 0x000000006d1aa000-0x000000006d332fff] Feb 9 20:58:12.545472 kernel: node 0: [mem 0x000000006ffff000-0x000000006fffffff] Feb 9 20:58:12.545476 kernel: node 0: [mem 0x0000000100000000-0x00000008837fffff] Feb 9 20:58:12.545481 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000008837fffff] Feb 9 20:58:12.545490 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 20:58:12.545495 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 20:58:12.545500 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 20:58:12.545506 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 20:58:12.545512 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 9 20:58:12.545517 kernel: On node 0, zone DMA32: 11468 pages in unavailable ranges Feb 9 20:58:12.545522 kernel: On node 0, zone Normal: 18432 pages in unavailable ranges Feb 9 20:58:12.545527 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 20:58:12.545533 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 20:58:12.545538 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 20:58:12.545544 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 20:58:12.545549 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 20:58:12.545554 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 20:58:12.545559 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 20:58:12.545564 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 20:58:12.545569 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 20:58:12.545575 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 20:58:12.545580 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 20:58:12.545585 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 20:58:12.545591 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 20:58:12.545596 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 20:58:12.545601 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 20:58:12.545606 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 20:58:12.545611 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 20:58:12.545617 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 20:58:12.545622 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 20:58:12.545627 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 20:58:12.545632 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 20:58:12.545638 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 20:58:12.545643 kernel: TSC deadline timer available Feb 9 20:58:12.545649 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 20:58:12.545654 kernel: [mem 0x7b800000-0xdfffffff] available for PCI devices Feb 9 20:58:12.545659 kernel: Booting paravirtualized kernel on bare hardware Feb 9 20:58:12.545664 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 20:58:12.545669 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 20:58:12.545675 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 20:58:12.545680 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 20:58:12.545686 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 20:58:12.545691 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8190325 Feb 9 20:58:12.545696 kernel: Policy zone: Normal Feb 9 20:58:12.545702 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 20:58:12.545707 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 20:58:12.545712 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 20:58:12.545718 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 20:58:12.545723 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 20:58:12.545729 kernel: Memory: 32555736K/33281948K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 725952K reserved, 0K cma-reserved) Feb 9 20:58:12.545735 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 20:58:12.545740 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 20:58:12.545745 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 20:58:12.545750 kernel: rcu: Hierarchical RCU implementation. Feb 9 20:58:12.545756 kernel: rcu: RCU event tracing is enabled. Feb 9 20:58:12.545761 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 20:58:12.545766 kernel: Rude variant of Tasks RCU enabled. Feb 9 20:58:12.545771 kernel: Tracing variant of Tasks RCU enabled. Feb 9 20:58:12.545777 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 20:58:12.545783 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 20:58:12.545788 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 20:58:12.545793 kernel: random: crng init done Feb 9 20:58:12.545798 kernel: Console: colour dummy device 80x25 Feb 9 20:58:12.545803 kernel: printk: console [tty0] enabled Feb 9 20:58:12.545808 kernel: printk: console [ttyS1] enabled Feb 9 20:58:12.545814 kernel: ACPI: Core revision 20210730 Feb 9 20:58:12.545819 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 9 20:58:12.545825 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 20:58:12.545830 kernel: DMAR: Host address width 39 Feb 9 20:58:12.545835 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 9 20:58:12.545841 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 9 20:58:12.545846 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 20:58:12.545851 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 20:58:12.545856 kernel: DMAR: RMRR base: 0x0000006e011000 end: 0x0000006e25afff Feb 9 20:58:12.545861 kernel: DMAR: RMRR base: 0x00000079000000 end: 0x0000007b7fffff Feb 9 20:58:12.545867 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 9 20:58:12.545873 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 20:58:12.545878 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 20:58:12.545883 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 20:58:12.545888 kernel: x2apic enabled Feb 9 20:58:12.545893 kernel: Switched APIC routing to cluster x2apic. Feb 9 20:58:12.545899 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 20:58:12.545904 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 20:58:12.545909 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 20:58:12.545914 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 20:58:12.545920 kernel: process: using mwait in idle threads Feb 9 20:58:12.545926 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 20:58:12.545931 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 20:58:12.545936 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 20:58:12.545941 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 20:58:12.545946 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 20:58:12.545952 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 20:58:12.545957 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 20:58:12.545962 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 20:58:12.545968 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 20:58:12.545973 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 20:58:12.545979 kernel: TAA: Mitigation: TSX disabled Feb 9 20:58:12.545984 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 20:58:12.545989 kernel: SRBDS: Mitigation: Microcode Feb 9 20:58:12.545994 kernel: GDS: Vulnerable: No microcode Feb 9 20:58:12.545999 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 20:58:12.546004 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 20:58:12.546010 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 20:58:12.546016 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 20:58:12.546021 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 20:58:12.546026 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 20:58:12.546031 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 20:58:12.546036 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 20:58:12.546042 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 20:58:12.546047 kernel: Freeing SMP alternatives memory: 32K Feb 9 20:58:12.546052 kernel: pid_max: default: 32768 minimum: 301 Feb 9 20:58:12.546057 kernel: LSM: Security Framework initializing Feb 9 20:58:12.546063 kernel: SELinux: Initializing. Feb 9 20:58:12.546068 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 20:58:12.546073 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 20:58:12.546079 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 20:58:12.546084 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 20:58:12.546089 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 20:58:12.546094 kernel: ... version: 4 Feb 9 20:58:12.546099 kernel: ... bit width: 48 Feb 9 20:58:12.546105 kernel: ... generic registers: 4 Feb 9 20:58:12.546111 kernel: ... value mask: 0000ffffffffffff Feb 9 20:58:12.546116 kernel: ... max period: 00007fffffffffff Feb 9 20:58:12.546121 kernel: ... fixed-purpose events: 3 Feb 9 20:58:12.546126 kernel: ... event mask: 000000070000000f Feb 9 20:58:12.546131 kernel: signal: max sigframe size: 2032 Feb 9 20:58:12.546136 kernel: rcu: Hierarchical SRCU implementation. Feb 9 20:58:12.546142 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 20:58:12.546147 kernel: smp: Bringing up secondary CPUs ... Feb 9 20:58:12.546152 kernel: x86: Booting SMP configuration: Feb 9 20:58:12.546158 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 20:58:12.546163 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 20:58:12.546169 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 20:58:12.546174 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 20:58:12.546179 kernel: smpboot: Max logical packages: 1 Feb 9 20:58:12.546184 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 20:58:12.546190 kernel: devtmpfs: initialized Feb 9 20:58:12.546195 kernel: x86/mm: Memory block size: 128MB Feb 9 20:58:12.546200 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x62c37000-0x62c37fff] (4096 bytes) Feb 9 20:58:12.546206 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6d333000-0x6d764fff] (4399104 bytes) Feb 9 20:58:12.546211 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 20:58:12.546216 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 20:58:12.546222 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 20:58:12.546227 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 20:58:12.546232 kernel: audit: initializing netlink subsys (disabled) Feb 9 20:58:12.546237 kernel: audit: type=2000 audit(1707512286.111:1): state=initialized audit_enabled=0 res=1 Feb 9 20:58:12.546242 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 20:58:12.546248 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 20:58:12.546253 kernel: cpuidle: using governor menu Feb 9 20:58:12.546258 kernel: ACPI: bus type PCI registered Feb 9 20:58:12.546263 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 20:58:12.546269 kernel: dca service started, version 1.12.1 Feb 9 20:58:12.546274 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 20:58:12.546279 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 20:58:12.546284 kernel: PCI: Using configuration type 1 for base access Feb 9 20:58:12.546289 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 20:58:12.546295 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 20:58:12.546300 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 20:58:12.546306 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 20:58:12.546311 kernel: ACPI: Added _OSI(Module Device) Feb 9 20:58:12.546316 kernel: ACPI: Added _OSI(Processor Device) Feb 9 20:58:12.546321 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 20:58:12.546326 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 20:58:12.546331 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 20:58:12.546337 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 20:58:12.546342 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 20:58:12.546348 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 20:58:12.546373 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:58:12.546378 kernel: ACPI: SSDT 0xFFFF90E081553900 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 20:58:12.546383 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 20:58:12.546389 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:58:12.546394 kernel: ACPI: SSDT 0xFFFF90E08154B000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 20:58:12.546399 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:58:12.546404 kernel: ACPI: SSDT 0xFFFF90E081D9F800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 20:58:12.546425 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:58:12.546431 kernel: ACPI: SSDT 0xFFFF90E081D9E000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 20:58:12.546436 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:58:12.546441 kernel: ACPI: SSDT 0xFFFF90E081540000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 20:58:12.546446 kernel: ACPI: Dynamic OEM Table Load: Feb 9 20:58:12.546451 kernel: ACPI: SSDT 0xFFFF90E081548800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 20:58:12.546457 kernel: ACPI: Interpreter enabled Feb 9 20:58:12.546462 kernel: ACPI: PM: (supports S0 S5) Feb 9 20:58:12.546467 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 20:58:12.546472 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 20:58:12.546478 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 20:58:12.546483 kernel: HEST: Table parsing has been initialized. Feb 9 20:58:12.546488 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 20:58:12.546494 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 20:58:12.546499 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 20:58:12.546504 kernel: ACPI: PM: Power Resource [USBC] Feb 9 20:58:12.546509 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 20:58:12.546514 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 20:58:12.546519 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 20:58:12.546525 kernel: ACPI: PM: Power Resource [WRST] Feb 9 20:58:12.546531 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 9 20:58:12.546536 kernel: ACPI: PM: Power Resource [FN00] Feb 9 20:58:12.546541 kernel: ACPI: PM: Power Resource [FN01] Feb 9 20:58:12.546546 kernel: ACPI: PM: Power Resource [FN02] Feb 9 20:58:12.546551 kernel: ACPI: PM: Power Resource [FN03] Feb 9 20:58:12.546556 kernel: ACPI: PM: Power Resource [FN04] Feb 9 20:58:12.546561 kernel: ACPI: PM: Power Resource [PIN] Feb 9 20:58:12.546566 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 20:58:12.546631 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 20:58:12.546677 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 20:58:12.546717 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 20:58:12.546724 kernel: PCI host bridge to bus 0000:00 Feb 9 20:58:12.546766 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 20:58:12.546802 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 20:58:12.546837 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 20:58:12.546875 kernel: pci_bus 0000:00: root bus resource [mem 0x7b800000-0xdfffffff window] Feb 9 20:58:12.546909 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 20:58:12.546945 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 20:58:12.546992 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 20:58:12.547041 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 20:58:12.547084 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 20:58:12.547130 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 9 20:58:12.547172 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 9 20:58:12.547218 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 9 20:58:12.547261 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x7c000000-0x7cffffff 64bit] Feb 9 20:58:12.547301 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 9 20:58:12.547342 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 9 20:58:12.547422 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 20:58:12.547464 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x7e51f000-0x7e51ffff 64bit] Feb 9 20:58:12.547509 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 20:58:12.547549 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x7e51e000-0x7e51efff 64bit] Feb 9 20:58:12.547592 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 20:58:12.547633 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x7e500000-0x7e50ffff 64bit] Feb 9 20:58:12.547675 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 20:58:12.547721 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 20:58:12.547761 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x7e512000-0x7e513fff 64bit] Feb 9 20:58:12.547802 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x7e51d000-0x7e51dfff 64bit] Feb 9 20:58:12.547845 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 20:58:12.547886 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 20:58:12.547929 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 20:58:12.547972 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 20:58:12.548014 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 20:58:12.548055 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x7e51a000-0x7e51afff 64bit] Feb 9 20:58:12.548096 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 20:58:12.548146 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 20:58:12.548188 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x7e519000-0x7e519fff 64bit] Feb 9 20:58:12.548229 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 20:58:12.548273 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 20:58:12.548312 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x7e518000-0x7e518fff 64bit] Feb 9 20:58:12.548371 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 20:58:12.548433 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 20:58:12.548473 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x7e510000-0x7e511fff] Feb 9 20:58:12.548513 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x7e517000-0x7e5170ff] Feb 9 20:58:12.548555 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 9 20:58:12.548594 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 9 20:58:12.548634 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 9 20:58:12.548674 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x7e516000-0x7e5167ff] Feb 9 20:58:12.548713 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 20:58:12.548758 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 20:58:12.548801 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 20:58:12.548848 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 20:58:12.548890 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 20:58:12.548933 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 20:58:12.548977 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 20:58:12.549021 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 20:58:12.549062 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 20:58:12.549106 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 9 20:58:12.549146 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 9 20:58:12.549191 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 20:58:12.549231 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 20:58:12.549280 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 20:58:12.549325 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 20:58:12.549385 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x7e514000-0x7e5140ff 64bit] Feb 9 20:58:12.549439 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 20:58:12.549484 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 20:58:12.549524 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 20:58:12.549566 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 20:58:12.549613 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 20:58:12.549654 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 20:58:12.549697 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x7e200000-0x7e2fffff pref] Feb 9 20:58:12.549738 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 9 20:58:12.549780 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 20:58:12.549821 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 20:58:12.549869 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 20:58:12.549911 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 20:58:12.549953 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x7e100000-0x7e1fffff pref] Feb 9 20:58:12.549994 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 9 20:58:12.550035 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 20:58:12.550077 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 20:58:12.550117 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 20:58:12.550160 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 9 20:58:12.550200 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 20:58:12.550241 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 20:58:12.550285 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 20:58:12.550328 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x7e400000-0x7e47ffff] Feb 9 20:58:12.550396 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 20:58:12.550456 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x7e480000-0x7e483fff] Feb 9 20:58:12.550497 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 20:58:12.550540 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 20:58:12.550580 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 20:58:12.550621 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 9 20:58:12.550668 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 9 20:58:12.550710 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x7e300000-0x7e37ffff] Feb 9 20:58:12.550752 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 20:58:12.550793 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x7e380000-0x7e383fff] Feb 9 20:58:12.550837 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 9 20:58:12.550877 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 20:58:12.550917 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 20:58:12.550957 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 9 20:58:12.550998 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 20:58:12.551042 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 20:58:12.551083 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 9 20:58:12.551198 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 20:58:12.551241 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 20:58:12.551283 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 20:58:12.551322 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 20:58:12.551388 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 20:58:12.551434 kernel: pci_bus 0000:08: extended config space not accessible Feb 9 20:58:12.551500 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 20:58:12.551545 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x7d000000-0x7dffffff] Feb 9 20:58:12.551591 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x7e000000-0x7e01ffff] Feb 9 20:58:12.551635 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 20:58:12.551678 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 20:58:12.551722 kernel: pci 0000:08:00.0: supports D1 D2 Feb 9 20:58:12.551766 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 20:58:12.551808 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 20:58:12.551851 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 20:58:12.551895 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 20:58:12.551903 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 20:58:12.551909 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 20:58:12.551914 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 20:58:12.551920 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 20:58:12.551926 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 20:58:12.551931 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 20:58:12.551937 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 20:58:12.551942 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 20:58:12.551949 kernel: iommu: Default domain type: Translated Feb 9 20:58:12.551955 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 20:58:12.552000 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 9 20:58:12.552044 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 20:58:12.552088 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 9 20:58:12.552096 kernel: vgaarb: loaded Feb 9 20:58:12.552102 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 20:58:12.552107 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Feb 9 20:58:12.552113 kernel: PTP clock support registered Feb 9 20:58:12.552120 kernel: PCI: Using ACPI for IRQ routing Feb 9 20:58:12.552126 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 20:58:12.552131 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 20:58:12.552137 kernel: e820: reserve RAM buffer [mem 0x62c37000-0x63ffffff] Feb 9 20:58:12.552142 kernel: e820: reserve RAM buffer [mem 0x6c0c7000-0x6fffffff] Feb 9 20:58:12.552148 kernel: e820: reserve RAM buffer [mem 0x6d333000-0x6fffffff] Feb 9 20:58:12.552153 kernel: e820: reserve RAM buffer [mem 0x883800000-0x883ffffff] Feb 9 20:58:12.552159 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 20:58:12.552164 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 9 20:58:12.552171 kernel: clocksource: Switched to clocksource tsc-early Feb 9 20:58:12.552176 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 20:58:12.552182 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 20:58:12.552187 kernel: pnp: PnP ACPI init Feb 9 20:58:12.552230 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 20:58:12.552273 kernel: pnp 00:02: [dma 0 disabled] Feb 9 20:58:12.552313 kernel: pnp 00:03: [dma 0 disabled] Feb 9 20:58:12.552356 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 20:58:12.552434 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 20:58:12.552473 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 20:58:12.552513 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 20:58:12.552550 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 20:58:12.552587 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 20:58:12.552622 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 20:58:12.552661 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 20:58:12.552697 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 20:58:12.552733 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 20:58:12.552769 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 20:58:12.552807 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 20:58:12.552844 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 20:58:12.552881 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 20:58:12.552917 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 20:58:12.552953 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 20:58:12.552988 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 20:58:12.553025 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 20:58:12.553065 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 20:58:12.553073 kernel: pnp: PnP ACPI: found 10 devices Feb 9 20:58:12.553079 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 20:58:12.553086 kernel: NET: Registered PF_INET protocol family Feb 9 20:58:12.553092 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 20:58:12.553097 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 20:58:12.553103 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 20:58:12.553109 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 20:58:12.553114 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 20:58:12.553120 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 20:58:12.553125 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 20:58:12.553132 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 20:58:12.553138 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 20:58:12.553143 kernel: NET: Registered PF_XDP protocol family Feb 9 20:58:12.553185 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7b800000-0x7b800fff 64bit] Feb 9 20:58:12.553226 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7b801000-0x7b801fff 64bit] Feb 9 20:58:12.553268 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7b802000-0x7b802fff 64bit] Feb 9 20:58:12.553310 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 20:58:12.553376 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 20:58:12.553441 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 20:58:12.553485 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 20:58:12.553529 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 20:58:12.553570 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 20:58:12.553612 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 9 20:58:12.553654 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 20:58:12.553696 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 20:58:12.553736 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 20:58:12.553777 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 20:58:12.553819 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 9 20:58:12.553860 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 20:58:12.553901 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 20:58:12.553943 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 9 20:58:12.553984 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 20:58:12.554029 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 20:58:12.554072 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 20:58:12.554115 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 20:58:12.554157 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 20:58:12.554198 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 20:58:12.554239 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 20:58:12.554277 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 20:58:12.554312 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 20:58:12.554352 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 20:58:12.554414 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 20:58:12.554468 kernel: pci_bus 0000:00: resource 7 [mem 0x7b800000-0xdfffffff window] Feb 9 20:58:12.554503 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 20:58:12.554545 kernel: pci_bus 0000:02: resource 1 [mem 0x7e100000-0x7e2fffff] Feb 9 20:58:12.554584 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 20:58:12.554626 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 9 20:58:12.554666 kernel: pci_bus 0000:04: resource 1 [mem 0x7e400000-0x7e4fffff] Feb 9 20:58:12.554707 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 9 20:58:12.554744 kernel: pci_bus 0000:05: resource 1 [mem 0x7e300000-0x7e3fffff] Feb 9 20:58:12.554785 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 20:58:12.554823 kernel: pci_bus 0000:07: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 9 20:58:12.554863 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 9 20:58:12.554902 kernel: pci_bus 0000:08: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 9 20:58:12.554911 kernel: PCI: CLS 64 bytes, default 64 Feb 9 20:58:12.554917 kernel: DMAR: No ATSR found Feb 9 20:58:12.554922 kernel: DMAR: No SATC found Feb 9 20:58:12.554928 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 9 20:58:12.554934 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 9 20:58:12.554939 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 9 20:58:12.554945 kernel: DMAR: IOMMU feature pasid inconsistent Feb 9 20:58:12.554950 kernel: DMAR: IOMMU feature eafs inconsistent Feb 9 20:58:12.554956 kernel: DMAR: IOMMU feature prs inconsistent Feb 9 20:58:12.554963 kernel: DMAR: IOMMU feature nest inconsistent Feb 9 20:58:12.554968 kernel: DMAR: IOMMU feature mts inconsistent Feb 9 20:58:12.554974 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 9 20:58:12.554979 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 9 20:58:12.554985 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 20:58:12.554991 kernel: DMAR: dmar1: Using Queued invalidation Feb 9 20:58:12.555033 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 20:58:12.555074 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 20:58:12.555119 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 9 20:58:12.555160 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 9 20:58:12.555199 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 9 20:58:12.555240 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 9 20:58:12.555280 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 9 20:58:12.555321 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 9 20:58:12.555384 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 9 20:58:12.555446 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 9 20:58:12.555486 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 9 20:58:12.555529 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 9 20:58:12.555569 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 9 20:58:12.555608 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 9 20:58:12.555649 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 9 20:58:12.555689 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 9 20:58:12.555730 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 9 20:58:12.555770 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 9 20:58:12.555810 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 9 20:58:12.555852 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 9 20:58:12.555892 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 9 20:58:12.555933 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 9 20:58:12.555972 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 9 20:58:12.556015 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 9 20:58:12.556056 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 9 20:58:12.556099 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 20:58:12.556141 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 9 20:58:12.556185 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 9 20:58:12.556228 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 9 20:58:12.556236 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 20:58:12.556242 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 20:58:12.556248 kernel: software IO TLB: mapped [mem 0x00000000680c7000-0x000000006c0c7000] (64MB) Feb 9 20:58:12.556253 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 9 20:58:12.556259 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 20:58:12.556265 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 20:58:12.556271 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 20:58:12.556277 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 9 20:58:12.556323 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 20:58:12.556331 kernel: Initialise system trusted keyrings Feb 9 20:58:12.556337 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 20:58:12.556342 kernel: Key type asymmetric registered Feb 9 20:58:12.556348 kernel: Asymmetric key parser 'x509' registered Feb 9 20:58:12.556378 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 20:58:12.556385 kernel: io scheduler mq-deadline registered Feb 9 20:58:12.556391 kernel: io scheduler kyber registered Feb 9 20:58:12.556415 kernel: io scheduler bfq registered Feb 9 20:58:12.556456 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 9 20:58:12.556497 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 9 20:58:12.556539 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 9 20:58:12.556579 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 9 20:58:12.556621 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 9 20:58:12.556662 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 9 20:58:12.556704 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 9 20:58:12.556749 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 20:58:12.556757 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 20:58:12.556762 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 20:58:12.556768 kernel: pstore: Registered erst as persistent store backend Feb 9 20:58:12.556774 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 20:58:12.556779 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 20:58:12.556786 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 20:58:12.556792 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 20:58:12.556834 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 20:58:12.556841 kernel: i8042: PNP: No PS/2 controller found. Feb 9 20:58:12.556877 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 20:58:12.556915 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 20:58:12.556952 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T20:58:11 UTC (1707512291) Feb 9 20:58:12.556989 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 20:58:12.556997 kernel: fail to initialize ptp_kvm Feb 9 20:58:12.557003 kernel: intel_pstate: Intel P-state driver initializing Feb 9 20:58:12.557009 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 20:58:12.557014 kernel: intel_pstate: HWP enabled Feb 9 20:58:12.557020 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 20:58:12.557025 kernel: vesafb: scrolling: redraw Feb 9 20:58:12.557031 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 20:58:12.557037 kernel: vesafb: framebuffer at 0x7d000000, mapped to 0x00000000301a3ad7, using 768k, total 768k Feb 9 20:58:12.557043 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 20:58:12.557049 kernel: fb0: VESA VGA frame buffer device Feb 9 20:58:12.557054 kernel: NET: Registered PF_INET6 protocol family Feb 9 20:58:12.557060 kernel: Segment Routing with IPv6 Feb 9 20:58:12.557066 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 20:58:12.557071 kernel: NET: Registered PF_PACKET protocol family Feb 9 20:58:12.557077 kernel: Key type dns_resolver registered Feb 9 20:58:12.557082 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 20:58:12.557088 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 20:58:12.557093 kernel: IPI shorthand broadcast: enabled Feb 9 20:58:12.557100 kernel: sched_clock: Marking stable (2273440755, 1352945797)->(4614688652, -988302100) Feb 9 20:58:12.557105 kernel: registered taskstats version 1 Feb 9 20:58:12.557111 kernel: Loading compiled-in X.509 certificates Feb 9 20:58:12.557117 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 20:58:12.557122 kernel: Key type .fscrypt registered Feb 9 20:58:12.557128 kernel: Key type fscrypt-provisioning registered Feb 9 20:58:12.557133 kernel: pstore: Using crash dump compression: deflate Feb 9 20:58:12.557139 kernel: ima: Allocated hash algorithm: sha1 Feb 9 20:58:12.557145 kernel: ima: No architecture policies found Feb 9 20:58:12.557151 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 20:58:12.557157 kernel: Write protecting the kernel read-only data: 28672k Feb 9 20:58:12.557162 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 20:58:12.557168 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 20:58:12.557173 kernel: Run /init as init process Feb 9 20:58:12.557179 kernel: with arguments: Feb 9 20:58:12.557184 kernel: /init Feb 9 20:58:12.557190 kernel: with environment: Feb 9 20:58:12.557196 kernel: HOME=/ Feb 9 20:58:12.557202 kernel: TERM=linux Feb 9 20:58:12.557207 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 20:58:12.557214 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 20:58:12.557221 systemd[1]: Detected architecture x86-64. Feb 9 20:58:12.557227 systemd[1]: Running in initrd. Feb 9 20:58:12.557232 systemd[1]: No hostname configured, using default hostname. Feb 9 20:58:12.557238 systemd[1]: Hostname set to <localhost>. Feb 9 20:58:12.557244 systemd[1]: Initializing machine ID from random generator. Feb 9 20:58:12.557250 systemd[1]: Queued start job for default target initrd.target. Feb 9 20:58:12.557255 systemd[1]: Started systemd-ask-password-console.path. Feb 9 20:58:12.557261 systemd[1]: Reached target cryptsetup.target. Feb 9 20:58:12.557266 systemd[1]: Reached target paths.target. Feb 9 20:58:12.557272 systemd[1]: Reached target slices.target. Feb 9 20:58:12.557277 systemd[1]: Reached target swap.target. Feb 9 20:58:12.557283 systemd[1]: Reached target timers.target. Feb 9 20:58:12.557289 systemd[1]: Listening on iscsid.socket. Feb 9 20:58:12.557295 systemd[1]: Listening on iscsiuio.socket. Feb 9 20:58:12.557301 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 20:58:12.557307 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 20:58:12.557312 systemd[1]: Listening on systemd-journald.socket. Feb 9 20:58:12.557318 systemd[1]: Listening on systemd-networkd.socket. Feb 9 20:58:12.557324 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 20:58:12.557329 kernel: tsc: Refined TSC clocksource calibration: 3408.098 MHz Feb 9 20:58:12.557336 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 20:58:12.557342 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x312030e451a, max_idle_ns: 440795292765 ns Feb 9 20:58:12.557347 kernel: clocksource: Switched to clocksource tsc Feb 9 20:58:12.557376 systemd[1]: Reached target sockets.target. Feb 9 20:58:12.557382 systemd[1]: Starting kmod-static-nodes.service... Feb 9 20:58:12.557388 systemd[1]: Finished network-cleanup.service. Feb 9 20:58:12.557394 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 20:58:12.557419 systemd[1]: Starting systemd-journald.service... Feb 9 20:58:12.557425 systemd[1]: Starting systemd-modules-load.service... Feb 9 20:58:12.557434 systemd-journald[268]: Journal started Feb 9 20:58:12.557458 systemd-journald[268]: Runtime Journal (/run/log/journal/73dfa9cb3bc043dd85fb86636cc74268) is 8.0M, max 636.8M, 628.8M free. Feb 9 20:58:12.560049 systemd-modules-load[269]: Inserted module 'overlay' Feb 9 20:58:12.566000 audit: BPF prog-id=6 op=LOAD Feb 9 20:58:12.584354 kernel: audit: type=1334 audit(1707512292.566:2): prog-id=6 op=LOAD Feb 9 20:58:12.584366 systemd[1]: Starting systemd-resolved.service... Feb 9 20:58:12.633407 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 20:58:12.633422 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 20:58:12.663379 kernel: Bridge firewalling registered Feb 9 20:58:12.663395 systemd[1]: Started systemd-journald.service. Feb 9 20:58:12.677947 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 9 20:58:12.738459 kernel: audit: type=1130 audit(1707512292.686:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:12.738470 kernel: SCSI subsystem initialized Feb 9 20:58:12.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:12.683988 systemd-resolved[271]: Positive Trust Anchors: Feb 9 20:58:12.784452 kernel: audit: type=1130 audit(1707512292.741:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:12.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:12.683994 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 20:58:12.900453 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 20:58:12.900465 kernel: audit: type=1130 audit(1707512292.804:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:12.900473 kernel: device-mapper: uevent: version 1.0.3 Feb 9 20:58:12.900480 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 20:58:12.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:12.684013 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 20:58:12.997558 kernel: audit: type=1130 audit(1707512292.908:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:12.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:12.685561 systemd-resolved[271]: Defaulting to hostname 'linux'. Feb 9 20:58:13.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:12.686590 systemd[1]: Started systemd-resolved.service. Feb 9 20:58:13.111564 kernel: audit: type=1130 audit(1707512293.005:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:13.111579 kernel: audit: type=1130 audit(1707512293.058:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:13.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:12.741783 systemd[1]: Finished kmod-static-nodes.service. Feb 9 20:58:12.804519 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 20:58:12.902878 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 9 20:58:12.908630 systemd[1]: Finished systemd-modules-load.service. Feb 9 20:58:13.005712 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 20:58:13.058617 systemd[1]: Reached target nss-lookup.target. Feb 9 20:58:13.121974 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 20:58:13.142047 systemd[1]: Starting systemd-sysctl.service... Feb 9 20:58:13.142429 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 20:58:13.145277 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 20:58:13.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:13.145992 systemd[1]: Finished systemd-sysctl.service. Feb 9 20:58:13.194451 kernel: audit: type=1130 audit(1707512293.144:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:13.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:13.207663 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 20:58:13.271471 kernel: audit: type=1130 audit(1707512293.207:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:13.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:13.263927 systemd[1]: Starting dracut-cmdline.service... Feb 9 20:58:13.285458 dracut-cmdline[293]: dracut-dracut-053 Feb 9 20:58:13.285458 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 20:58:13.285458 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 20:58:13.352443 kernel: Loading iSCSI transport class v2.0-870. Feb 9 20:58:13.352457 kernel: iscsi: registered transport (tcp) Feb 9 20:58:13.404304 kernel: iscsi: registered transport (qla4xxx) Feb 9 20:58:13.404354 kernel: QLogic iSCSI HBA Driver Feb 9 20:58:13.420592 systemd[1]: Finished dracut-cmdline.service. Feb 9 20:58:13.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:13.430128 systemd[1]: Starting dracut-pre-udev.service... Feb 9 20:58:13.486432 kernel: raid6: avx2x4 gen() 46848 MB/s Feb 9 20:58:13.521382 kernel: raid6: avx2x4 xor() 20296 MB/s Feb 9 20:58:13.556431 kernel: raid6: avx2x2 gen() 53950 MB/s Feb 9 20:58:13.591432 kernel: raid6: avx2x2 xor() 32009 MB/s Feb 9 20:58:13.626386 kernel: raid6: avx2x1 gen() 45124 MB/s Feb 9 20:58:13.661431 kernel: raid6: avx2x1 xor() 27811 MB/s Feb 9 20:58:13.696428 kernel: raid6: sse2x4 gen() 21344 MB/s Feb 9 20:58:13.730417 kernel: raid6: sse2x4 xor() 11984 MB/s Feb 9 20:58:13.764427 kernel: raid6: sse2x2 gen() 21726 MB/s Feb 9 20:58:13.798390 kernel: raid6: sse2x2 xor() 13439 MB/s Feb 9 20:58:13.832388 kernel: raid6: sse2x1 gen() 18291 MB/s Feb 9 20:58:13.884272 kernel: raid6: sse2x1 xor() 8920 MB/s Feb 9 20:58:13.884287 kernel: raid6: using algorithm avx2x2 gen() 53950 MB/s Feb 9 20:58:13.884294 kernel: raid6: .... xor() 32009 MB/s, rmw enabled Feb 9 20:58:13.902484 kernel: raid6: using avx2x2 recovery algorithm Feb 9 20:58:13.948355 kernel: xor: automatically using best checksumming function avx Feb 9 20:58:14.027387 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 20:58:14.032441 systemd[1]: Finished dracut-pre-udev.service. Feb 9 20:58:14.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:14.032000 audit: BPF prog-id=7 op=LOAD Feb 9 20:58:14.032000 audit: BPF prog-id=8 op=LOAD Feb 9 20:58:14.033199 systemd[1]: Starting systemd-udevd.service... Feb 9 20:58:14.040491 systemd-udevd[473]: Using default interface naming scheme 'v252'. Feb 9 20:58:14.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:14.053633 systemd[1]: Started systemd-udevd.service. Feb 9 20:58:14.095563 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation Feb 9 20:58:14.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:14.070030 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 20:58:14.092382 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 20:58:14.105112 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 20:58:14.153072 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 20:58:14.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:14.180362 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 20:58:14.216836 kernel: ACPI: bus type USB registered Feb 9 20:58:14.216872 kernel: usbcore: registered new interface driver usbfs Feb 9 20:58:14.216881 kernel: usbcore: registered new interface driver hub Feb 9 20:58:14.234641 kernel: usbcore: registered new device driver usb Feb 9 20:58:14.253355 kernel: libata version 3.00 loaded. Feb 9 20:58:14.275359 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 20:58:14.275412 kernel: AES CTR mode by8 optimization enabled Feb 9 20:58:14.327054 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 20:58:14.327097 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 20:58:14.345507 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Feb 9 20:58:14.345797 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 20:58:14.346006 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 20:58:14.366355 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 9 20:58:14.399117 kernel: pps pps0: new PPS source ptp0 Feb 9 20:58:14.399215 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 20:58:14.399292 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 9 20:58:14.450356 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 20:58:14.450471 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 20:58:14.450558 kernel: scsi host0: ahci Feb 9 20:58:14.450660 kernel: scsi host1: ahci Feb 9 20:58:14.450726 kernel: scsi host2: ahci Feb 9 20:58:14.450816 kernel: scsi host3: ahci Feb 9 20:58:14.450896 kernel: scsi host4: ahci Feb 9 20:58:14.450951 kernel: scsi host5: ahci Feb 9 20:58:14.451018 kernel: scsi host6: ahci Feb 9 20:58:14.451100 kernel: scsi host7: ahci Feb 9 20:58:14.451176 kernel: ata1: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516100 irq 134 Feb 9 20:58:14.451184 kernel: ata2: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516180 irq 134 Feb 9 20:58:14.451190 kernel: ata3: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516200 irq 134 Feb 9 20:58:14.451197 kernel: ata4: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516280 irq 134 Feb 9 20:58:14.451203 kernel: ata5: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516300 irq 134 Feb 9 20:58:14.451209 kernel: ata6: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516380 irq 134 Feb 9 20:58:14.451216 kernel: ata7: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516400 irq 134 Feb 9 20:58:14.451222 kernel: ata8: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516480 irq 134 Feb 9 20:58:14.451230 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:25:64 Feb 9 20:58:14.451282 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 9 20:58:14.466332 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 20:58:14.478912 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 20:58:14.503408 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 20:58:14.545406 kernel: pps pps1: new PPS source ptp1 Feb 9 20:58:14.545477 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 20:58:14.568468 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 9 20:58:14.568542 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 20:58:14.595718 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 20:58:14.595789 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 20:58:14.609210 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:25:65 Feb 9 20:58:14.624395 kernel: hub 1-0:1.0: USB hub found Feb 9 20:58:14.624478 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 20:58:14.627401 kernel: port_module: 8 callbacks suppressed Feb 9 20:58:14.627420 kernel: mlx5_core 0000:02:00.0: Port module event: module 0, Cable plugged Feb 9 20:58:14.641393 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 9 20:58:14.641465 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 20:58:14.662293 kernel: hub 1-0:1.0: 16 ports detected Feb 9 20:58:14.662371 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 20:58:14.687416 kernel: hub 2-0:1.0: USB hub found Feb 9 20:58:14.765356 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 20:58:14.765373 kernel: hub 2-0:1.0: 10 ports detected Feb 9 20:58:14.780359 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 20:58:14.808589 kernel: usb: port power management may be unreliable Feb 9 20:58:14.809392 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 9 20:58:14.852386 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 20:58:14.852459 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 20:58:14.879355 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Feb 9 20:58:14.879430 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 20:58:14.908923 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 20:58:14.908995 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 20:58:14.997386 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 20:58:14.997413 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 9 20:58:15.151407 kernel: hub 1-14:1.0: USB hub found Feb 9 20:58:15.151505 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 20:58:15.178917 kernel: hub 1-14:1.0: 4 ports detected Feb 9 20:58:15.178997 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 20:58:15.208413 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 20:58:15.208503 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 9 20:58:15.245400 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 9 20:58:15.262811 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 20:58:15.299878 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 20:58:15.299950 kernel: ata2.00: Features: NCQ-prio Feb 9 20:58:15.351501 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 20:58:15.351517 kernel: ata1.00: Features: NCQ-prio Feb 9 20:58:15.370432 kernel: ata2.00: configured for UDMA/133 Feb 9 20:58:15.388356 kernel: ata1.00: configured for UDMA/133 Feb 9 20:58:15.408356 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 9 20:58:15.428355 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 9 20:58:15.446358 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 9 20:58:15.466722 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 20:58:15.466743 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:58:15.482665 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 20:58:15.482829 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 20:58:15.484407 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 9 20:58:15.497419 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 20:58:15.502419 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Feb 9 20:58:15.502504 kernel: sd 1:0:0:0: [sda] Write Protect is off Feb 9 20:58:15.535427 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Feb 9 20:58:15.535503 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 20:58:15.535936 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 20:58:15.553519 kernel: sd 0:0:0:0: [sdb] Write Protect is off Feb 9 20:58:15.584934 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 20:58:15.585007 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 20:58:15.671156 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 20:58:15.671171 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 20:58:15.671244 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 20:58:15.706375 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Feb 9 20:58:15.722421 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:58:15.753397 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 20:58:15.753414 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 20:58:15.784655 kernel: GPT:9289727 != 937703087 Feb 9 20:58:15.784672 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 20:58:15.801275 kernel: GPT:9289727 != 937703087 Feb 9 20:58:15.815364 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 20:58:15.830896 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 20:58:15.846397 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:58:15.861143 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Feb 9 20:58:15.894356 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Feb 9 20:58:15.917706 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 20:58:15.983477 kernel: usbcore: registered new interface driver usbhid Feb 9 20:58:15.983490 kernel: usbhid: USB HID core driver Feb 9 20:58:15.983501 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (522) Feb 9 20:58:15.983508 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Feb 9 20:58:15.983579 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 20:58:15.960696 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 20:58:16.006456 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 20:58:16.051036 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 20:58:16.157514 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 20:58:16.157629 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 20:58:16.157642 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 20:58:16.111222 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 20:58:16.166943 systemd[1]: Starting disk-uuid.service... Feb 9 20:58:16.218481 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:58:16.218492 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 20:58:16.218499 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:58:16.218546 disk-uuid[692]: Primary Header is updated. Feb 9 20:58:16.218546 disk-uuid[692]: Secondary Entries is updated. Feb 9 20:58:16.218546 disk-uuid[692]: Secondary Header is updated. Feb 9 20:58:16.277439 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 20:58:16.277449 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:58:16.277456 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 20:58:17.263894 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 20:58:17.282974 disk-uuid[694]: The operation has completed successfully. Feb 9 20:58:17.291479 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 20:58:17.321187 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 20:58:17.420125 kernel: audit: type=1130 audit(1707512297.328:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.420140 kernel: audit: type=1131 audit(1707512297.328:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.321244 systemd[1]: Finished disk-uuid.service. Feb 9 20:58:17.450383 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 20:58:17.329147 systemd[1]: Starting verity-setup.service... Feb 9 20:58:17.480725 systemd[1]: Found device dev-mapper-usr.device. Feb 9 20:58:17.490643 systemd[1]: Mounting sysusr-usr.mount... Feb 9 20:58:17.503526 systemd[1]: Finished verity-setup.service. Feb 9 20:58:17.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.565356 kernel: audit: type=1130 audit(1707512297.518:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.593756 systemd[1]: Mounted sysusr-usr.mount. Feb 9 20:58:17.609555 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 20:58:17.601688 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 20:58:17.691513 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 20:58:17.691527 kernel: BTRFS info (device sdb6): using free space tree Feb 9 20:58:17.691534 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 20:58:17.691544 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 20:58:17.602091 systemd[1]: Starting ignition-setup.service... Feb 9 20:58:17.624785 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 20:58:17.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.703772 systemd[1]: Finished ignition-setup.service. Feb 9 20:58:17.825346 kernel: audit: type=1130 audit(1707512297.720:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.825364 kernel: audit: type=1130 audit(1707512297.776:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.720685 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 20:58:17.834000 audit: BPF prog-id=9 op=LOAD Feb 9 20:58:17.777020 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 20:58:17.870403 kernel: audit: type=1334 audit(1707512297.834:24): prog-id=9 op=LOAD Feb 9 20:58:17.835317 systemd[1]: Starting systemd-networkd.service... Feb 9 20:58:17.929358 kernel: audit: type=1130 audit(1707512297.878:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.922347 ignition[870]: Ignition 2.14.0 Feb 9 20:58:17.870002 systemd-networkd[875]: lo: Link UP Feb 9 20:58:17.922355 ignition[870]: Stage: fetch-offline Feb 9 20:58:17.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.870004 systemd-networkd[875]: lo: Gained carrier Feb 9 20:58:18.024439 kernel: audit: type=1130 audit(1707512297.957:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:18.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.922381 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:58:17.870333 systemd-networkd[875]: Enumeration completed Feb 9 20:58:17.922395 ignition[870]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:58:17.870376 systemd[1]: Started systemd-networkd.service. Feb 9 20:58:18.087452 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 20:58:18.087554 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Feb 9 20:58:17.930112 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:58:18.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.871139 systemd-networkd[875]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 20:58:18.135473 iscsid[902]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 20:58:18.135473 iscsid[902]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 20:58:18.135473 iscsid[902]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier]. Feb 9 20:58:18.135473 iscsid[902]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 20:58:18.135473 iscsid[902]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 20:58:18.135473 iscsid[902]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 20:58:18.135473 iscsid[902]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 20:58:18.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:18.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:17.930177 ignition[870]: parsed url from cmdline: "" Feb 9 20:58:17.878483 systemd[1]: Reached target network.target. Feb 9 20:58:17.930179 ignition[870]: no config URL provided Feb 9 20:58:17.935229 unknown[870]: fetched base config from "system" Feb 9 20:58:18.329469 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 20:58:17.930182 ignition[870]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 20:58:17.935233 unknown[870]: fetched user config from "system" Feb 9 20:58:17.930194 ignition[870]: parsing config with SHA512: 1bce3ee3ac735c46993772caae0dfdbe6912519258be108f6ed702f97cbf370672cab325eddbf5e07f657fac36cdec7d9d4a6f9fb2385d1c5c54bcaafdf6e5af Feb 9 20:58:17.938019 systemd[1]: Starting iscsiuio.service... Feb 9 20:58:17.935408 ignition[870]: fetch-offline: fetch-offline passed Feb 9 20:58:17.950632 systemd[1]: Started iscsiuio.service. Feb 9 20:58:17.935410 ignition[870]: POST message to Packet Timeline Feb 9 20:58:17.957720 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 20:58:17.935415 ignition[870]: POST Status error: resource requires networking Feb 9 20:58:18.017599 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 20:58:17.935444 ignition[870]: Ignition finished successfully Feb 9 20:58:18.018033 systemd[1]: Starting ignition-kargs.service... Feb 9 20:58:18.022768 ignition[891]: Ignition 2.14.0 Feb 9 20:58:18.032903 systemd[1]: Starting iscsid.service... Feb 9 20:58:18.022772 ignition[891]: Stage: kargs Feb 9 20:58:18.058456 systemd[1]: Started iscsid.service. Feb 9 20:58:18.022830 ignition[891]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:58:18.075624 systemd-networkd[875]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 20:58:18.022840 ignition[891]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:58:18.107087 systemd[1]: Starting dracut-initqueue.service... Feb 9 20:58:18.025832 ignition[891]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:58:18.124933 systemd[1]: Finished dracut-initqueue.service. Feb 9 20:58:18.026264 ignition[891]: kargs: kargs passed Feb 9 20:58:18.144475 systemd[1]: Reached target remote-fs-pre.target. Feb 9 20:58:18.026267 ignition[891]: POST message to Packet Timeline Feb 9 20:58:18.164383 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 20:58:18.026276 ignition[891]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 20:58:18.164417 systemd[1]: Reached target remote-fs.target. Feb 9 20:58:18.029165 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58534->[::1]:53: read: connection refused Feb 9 20:58:18.199267 systemd[1]: Starting dracut-pre-mount.service... Feb 9 20:58:18.229566 ignition[891]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 20:58:18.224887 systemd[1]: Finished dracut-pre-mount.service. Feb 9 20:58:18.230618 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:40270->[::1]:53: read: connection refused Feb 9 20:58:18.324307 systemd-networkd[875]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 20:58:18.352460 systemd-networkd[875]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 20:58:18.381077 systemd-networkd[875]: enp2s0f1np1: Link UP Feb 9 20:58:18.631195 ignition[891]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 20:58:18.381283 systemd-networkd[875]: enp2s0f1np1: Gained carrier Feb 9 20:58:18.632420 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43657->[::1]:53: read: connection refused Feb 9 20:58:18.394829 systemd-networkd[875]: enp2s0f0np0: Link UP Feb 9 20:58:18.395154 systemd-networkd[875]: eno2: Link UP Feb 9 20:58:18.395475 systemd-networkd[875]: eno1: Link UP Feb 9 20:58:19.102419 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Feb 9 20:58:19.102515 systemd-networkd[875]: enp2s0f0np0: Gained carrier Feb 9 20:58:19.135669 systemd-networkd[875]: enp2s0f0np0: DHCPv4 address 139.178.89.23/31, gateway 139.178.89.22 acquired from 145.40.83.140 Feb 9 20:58:19.432873 ignition[891]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 20:58:19.434072 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:37742->[::1]:53: read: connection refused Feb 9 20:58:19.783862 systemd-networkd[875]: enp2s0f1np1: Gained IPv6LL Feb 9 20:58:20.743836 systemd-networkd[875]: enp2s0f0np0: Gained IPv6LL Feb 9 20:58:21.035681 ignition[891]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 20:58:21.036796 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:55986->[::1]:53: read: connection refused Feb 9 20:58:24.240332 ignition[891]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 20:58:24.283115 ignition[891]: GET result: OK Feb 9 20:58:24.500170 ignition[891]: Ignition finished successfully Feb 9 20:58:24.501678 systemd[1]: Finished ignition-kargs.service. Feb 9 20:58:24.591805 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 20:58:24.591836 kernel: audit: type=1130 audit(1707512304.517:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:24.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:24.524904 ignition[919]: Ignition 2.14.0 Feb 9 20:58:24.518573 systemd[1]: Starting ignition-disks.service... Feb 9 20:58:24.524907 ignition[919]: Stage: disks Feb 9 20:58:24.524981 ignition[919]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:58:24.524990 ignition[919]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:58:24.526305 ignition[919]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:58:24.527572 ignition[919]: disks: disks passed Feb 9 20:58:24.527575 ignition[919]: POST message to Packet Timeline Feb 9 20:58:24.527585 ignition[919]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 20:58:24.549779 ignition[919]: GET result: OK Feb 9 20:58:24.833778 ignition[919]: Ignition finished successfully Feb 9 20:58:24.836840 systemd[1]: Finished ignition-disks.service. Feb 9 20:58:24.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:24.848906 systemd[1]: Reached target initrd-root-device.target. Feb 9 20:58:24.912624 kernel: audit: type=1130 audit(1707512304.848:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:24.912589 systemd[1]: Reached target local-fs-pre.target. Feb 9 20:58:24.926548 systemd[1]: Reached target local-fs.target. Feb 9 20:58:24.926582 systemd[1]: Reached target sysinit.target. Feb 9 20:58:24.948565 systemd[1]: Reached target basic.target. Feb 9 20:58:24.962183 systemd[1]: Starting systemd-fsck-root.service... Feb 9 20:58:24.981941 systemd-fsck[934]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 20:58:24.994392 systemd[1]: Finished systemd-fsck-root.service. Feb 9 20:58:25.084512 kernel: audit: type=1130 audit(1707512304.994:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.084527 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 20:58:24.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:24.995678 systemd[1]: Mounting sysroot.mount... Feb 9 20:58:25.092052 systemd[1]: Mounted sysroot.mount. Feb 9 20:58:25.106636 systemd[1]: Reached target initrd-root-fs.target. Feb 9 20:58:25.114303 systemd[1]: Mounting sysroot-usr.mount... Feb 9 20:58:25.139134 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 20:58:25.149153 systemd[1]: Starting flatcar-static-network.service... Feb 9 20:58:25.164564 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 20:58:25.164645 systemd[1]: Reached target ignition-diskful.target. Feb 9 20:58:25.183094 systemd[1]: Mounted sysroot-usr.mount. Feb 9 20:58:25.206258 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 20:58:25.349490 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (944) Feb 9 20:58:25.349508 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 20:58:25.349516 kernel: BTRFS info (device sdb6): using free space tree Feb 9 20:58:25.349523 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 20:58:25.349530 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 20:58:25.220173 systemd[1]: Starting initrd-setup-root.service... Feb 9 20:58:25.409226 kernel: audit: type=1130 audit(1707512305.357:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.409265 coreos-metadata[943]: Feb 09 20:58:25.297 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 20:58:25.409265 coreos-metadata[943]: Feb 09 20:58:25.321 INFO Fetch successful Feb 9 20:58:25.590645 kernel: audit: type=1130 audit(1707512305.418:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.590659 kernel: audit: type=1130 audit(1707512305.480:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.590667 kernel: audit: type=1131 audit(1707512305.480:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.590724 coreos-metadata[941]: Feb 09 20:58:25.296 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 20:58:25.590724 coreos-metadata[941]: Feb 09 20:58:25.323 INFO Fetch successful Feb 9 20:58:25.590724 coreos-metadata[941]: Feb 09 20:58:25.340 INFO wrote hostname ci-3510.3.2-a-a2b06d6def to /sysroot/etc/hostname Feb 9 20:58:25.639449 initrd-setup-root[951]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 20:58:25.285833 systemd[1]: Finished initrd-setup-root.service. Feb 9 20:58:25.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.691531 initrd-setup-root[961]: cut: /sysroot/etc/group: No such file or directory Feb 9 20:58:25.730551 kernel: audit: type=1130 audit(1707512305.664:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.358683 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 20:58:25.738596 initrd-setup-root[969]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 20:58:25.418691 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 20:58:25.758574 initrd-setup-root[977]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 20:58:25.418730 systemd[1]: Finished flatcar-static-network.service. Feb 9 20:58:25.776560 ignition[1018]: INFO : Ignition 2.14.0 Feb 9 20:58:25.776560 ignition[1018]: INFO : Stage: mount Feb 9 20:58:25.776560 ignition[1018]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:58:25.776560 ignition[1018]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:58:25.776560 ignition[1018]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:58:25.776560 ignition[1018]: INFO : mount: mount passed Feb 9 20:58:25.776560 ignition[1018]: INFO : POST message to Packet Timeline Feb 9 20:58:25.776560 ignition[1018]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 20:58:25.776560 ignition[1018]: INFO : GET result: OK Feb 9 20:58:25.480620 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 20:58:25.599894 systemd[1]: Starting ignition-mount.service... Feb 9 20:58:25.627940 systemd[1]: Starting sysroot-boot.service... Feb 9 20:58:25.647050 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 20:58:25.647089 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 20:58:25.647680 systemd[1]: Finished sysroot-boot.service. Feb 9 20:58:25.934172 ignition[1018]: INFO : Ignition finished successfully Feb 9 20:58:25.936480 systemd[1]: Finished ignition-mount.service. Feb 9 20:58:25.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:25.953389 systemd[1]: Starting ignition-files.service... Feb 9 20:58:26.024454 kernel: audit: type=1130 audit(1707512305.951:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.019157 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 20:58:26.070436 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1031) Feb 9 20:58:26.070447 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 20:58:26.104769 kernel: BTRFS info (device sdb6): using free space tree Feb 9 20:58:26.104784 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 20:58:26.153354 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 20:58:26.154509 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 20:58:26.170529 ignition[1050]: INFO : Ignition 2.14.0 Feb 9 20:58:26.170529 ignition[1050]: INFO : Stage: files Feb 9 20:58:26.170529 ignition[1050]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:58:26.170529 ignition[1050]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:58:26.170529 ignition[1050]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:58:26.170529 ignition[1050]: DEBUG : files: compiled without relabeling support, skipping Feb 9 20:58:26.170529 ignition[1050]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 20:58:26.170529 ignition[1050]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 20:58:26.283654 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1050) Feb 9 20:58:26.174735 unknown[1050]: wrote ssh authorized keys file for user: core Feb 9 20:58:26.292597 ignition[1050]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 20:58:26.292597 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3028782582" Feb 9 20:58:26.292597 ignition[1050]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3028782582": device or resource busy Feb 9 20:58:26.292597 ignition[1050]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3028782582", trying btrfs: device or resource busy Feb 9 20:58:26.292597 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3028782582" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3028782582" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem3028782582" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem3028782582" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 20:58:26.292597 ignition[1050]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 20:58:26.209493 systemd[1]: mnt-oem3028782582.mount: Deactivated successfully. Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(a): [started] processing unit "etcd-member.service" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(c): [started] processing unit "flannel-docker-opts.service" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(c): op(d): [started] writing systemd drop-in "retry.conf" at "/sysroot/etc/systemd/system/flannel-docker-opts.service.d/retry.conf" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(c): op(d): [finished] writing systemd drop-in "retry.conf" at "/sysroot/etc/systemd/system/flannel-docker-opts.service.d/retry.conf" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(c): [finished] processing unit "flannel-docker-opts.service" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(e): [started] processing unit "docker.service" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(e): [finished] processing unit "docker.service" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(f): [started] processing unit "flanneld.service" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(f): op(10): [started] writing systemd drop-in "50-network-config.conf" at "/sysroot/etc/systemd/system/flanneld.service.d/50-network-config.conf" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(f): op(10): [finished] writing systemd drop-in "50-network-config.conf" at "/sysroot/etc/systemd/system/flanneld.service.d/50-network-config.conf" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(f): [finished] processing unit "flanneld.service" Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(11): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(11): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 20:58:26.575698 ignition[1050]: INFO : files: op(12): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 20:58:26.963608 kernel: audit: type=1130 audit(1707512306.662:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.655707 systemd[1]: Finished ignition-files.service. Feb 9 20:58:26.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.979714 ignition[1050]: INFO : files: op(12): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 20:58:26.979714 ignition[1050]: INFO : files: op(13): [started] setting preset to enabled for "etcd-member.service" Feb 9 20:58:26.979714 ignition[1050]: INFO : files: op(13): [finished] setting preset to enabled for "etcd-member.service" Feb 9 20:58:26.979714 ignition[1050]: INFO : files: op(14): [started] setting preset to enabled for "docker.service" Feb 9 20:58:26.979714 ignition[1050]: INFO : files: op(14): [finished] setting preset to enabled for "docker.service" Feb 9 20:58:26.979714 ignition[1050]: INFO : files: op(15): [started] setting preset to enabled for "flanneld.service" Feb 9 20:58:26.979714 ignition[1050]: INFO : files: op(15): [finished] setting preset to enabled for "flanneld.service" Feb 9 20:58:26.979714 ignition[1050]: INFO : files: createResultFile: createFiles: op(16): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 20:58:26.979714 ignition[1050]: INFO : files: createResultFile: createFiles: op(16): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 20:58:26.979714 ignition[1050]: INFO : files: files passed Feb 9 20:58:26.979714 ignition[1050]: INFO : POST message to Packet Timeline Feb 9 20:58:26.979714 ignition[1050]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 20:58:26.979714 ignition[1050]: INFO : GET result: OK Feb 9 20:58:26.979714 ignition[1050]: INFO : Ignition finished successfully Feb 9 20:58:27.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.669257 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 20:58:27.267816 initrd-setup-root-after-ignition[1083]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 20:58:26.727567 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 20:58:26.727961 systemd[1]: Starting ignition-quench.service... Feb 9 20:58:27.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.769844 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 20:58:26.792928 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 20:58:27.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.793033 systemd[1]: Finished ignition-quench.service. Feb 9 20:58:27.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.811926 systemd[1]: Reached target ignition-complete.target. Feb 9 20:58:26.832382 systemd[1]: Starting initrd-parse-etc.service... Feb 9 20:58:26.875539 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 20:58:26.875611 systemd[1]: Finished initrd-parse-etc.service. Feb 9 20:58:26.894744 systemd[1]: Reached target initrd-fs.target. Feb 9 20:58:27.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.905799 systemd[1]: Reached target initrd.target. Feb 9 20:58:27.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.924922 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 20:58:27.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.926835 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 20:58:27.511544 ignition[1099]: INFO : Ignition 2.14.0 Feb 9 20:58:27.511544 ignition[1099]: INFO : Stage: umount Feb 9 20:58:27.511544 ignition[1099]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 20:58:27.511544 ignition[1099]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 20:58:27.511544 ignition[1099]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 20:58:27.511544 ignition[1099]: INFO : umount: umount passed Feb 9 20:58:27.511544 ignition[1099]: INFO : POST message to Packet Timeline Feb 9 20:58:27.511544 ignition[1099]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 20:58:27.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:26.956669 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 20:58:27.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.666001 iscsid[902]: iscsid shutting down. Feb 9 20:58:27.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.682036 ignition[1099]: INFO : GET result: OK Feb 9 20:58:26.974426 systemd[1]: Starting initrd-cleanup.service... Feb 9 20:58:27.001692 systemd[1]: Stopped target nss-lookup.target. Feb 9 20:58:27.021038 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 20:58:27.042119 systemd[1]: Stopped target timers.target. Feb 9 20:58:27.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.755752 ignition[1099]: INFO : Ignition finished successfully Feb 9 20:58:27.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.063020 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 20:58:27.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.779000 audit: BPF prog-id=6 op=UNLOAD Feb 9 20:58:27.063394 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 20:58:27.085335 systemd[1]: Stopped target initrd.target. Feb 9 20:58:27.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.105048 systemd[1]: Stopped target basic.target. Feb 9 20:58:27.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.125050 systemd[1]: Stopped target ignition-complete.target. Feb 9 20:58:27.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.149035 systemd[1]: Stopped target ignition-diskful.target. Feb 9 20:58:27.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.174051 systemd[1]: Stopped target initrd-root-device.target. Feb 9 20:58:27.190030 systemd[1]: Stopped target remote-fs.target. Feb 9 20:58:27.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.207007 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 20:58:27.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.226076 systemd[1]: Stopped target sysinit.target. Feb 9 20:58:27.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.242070 systemd[1]: Stopped target local-fs.target. Feb 9 20:58:27.258051 systemd[1]: Stopped target local-fs-pre.target. Feb 9 20:58:27.278065 systemd[1]: Stopped target swap.target. Feb 9 20:58:27.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.298888 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 20:58:27.299231 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 20:58:27.325263 systemd[1]: Stopped target cryptsetup.target. Feb 9 20:58:28.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.340944 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 20:58:28.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.341294 systemd[1]: Stopped dracut-initqueue.service. Feb 9 20:58:28.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.358193 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 20:58:27.358560 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 20:58:28.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.375238 systemd[1]: Stopped target paths.target. Feb 9 20:58:28.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.388918 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 20:58:28.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.392591 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 20:58:28.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:28.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.406046 systemd[1]: Stopped target slices.target. Feb 9 20:58:27.422019 systemd[1]: Stopped target sockets.target. Feb 9 20:58:27.438062 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 20:58:27.438467 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 20:58:27.455131 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 20:58:27.455490 systemd[1]: Stopped ignition-files.service. Feb 9 20:58:27.470138 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 20:58:27.470509 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 20:58:27.488405 systemd[1]: Stopping ignition-mount.service... Feb 9 20:58:27.503626 systemd[1]: Stopping iscsid.service... Feb 9 20:58:27.519088 systemd[1]: Stopping sysroot-boot.service... Feb 9 20:58:27.532530 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 20:58:27.532760 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 20:58:28.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:27.539816 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 20:58:27.539935 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 20:58:27.573327 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 20:58:27.575382 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 20:58:27.575606 systemd[1]: Stopped iscsid.service. Feb 9 20:58:27.594737 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 20:58:27.594951 systemd[1]: Stopped sysroot-boot.service. Feb 9 20:58:27.612649 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 20:58:27.612801 systemd[1]: Closed iscsid.socket. Feb 9 20:58:27.626764 systemd[1]: Stopping iscsiuio.service... Feb 9 20:58:27.641974 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 20:58:27.642183 systemd[1]: Stopped iscsiuio.service. Feb 9 20:58:27.659415 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 20:58:28.312371 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Feb 9 20:58:27.659650 systemd[1]: Finished initrd-cleanup.service. Feb 9 20:58:27.676787 systemd[1]: Stopped target network.target. Feb 9 20:58:27.689642 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 20:58:27.689739 systemd[1]: Closed iscsiuio.socket. Feb 9 20:58:27.703840 systemd[1]: Stopping systemd-networkd.service... Feb 9 20:58:27.710498 systemd-networkd[875]: enp2s0f0np0: DHCPv6 lease lost Feb 9 20:58:27.717792 systemd[1]: Stopping systemd-resolved.service... Feb 9 20:58:27.722490 systemd-networkd[875]: enp2s0f1np1: DHCPv6 lease lost Feb 9 20:58:27.733126 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 20:58:28.312000 audit: BPF prog-id=9 op=UNLOAD Feb 9 20:58:27.733335 systemd[1]: Stopped systemd-resolved.service. Feb 9 20:58:27.749205 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 20:58:27.749432 systemd[1]: Stopped systemd-networkd.service. Feb 9 20:58:27.764153 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 20:58:27.764341 systemd[1]: Stopped ignition-mount.service. Feb 9 20:58:27.779685 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 20:58:27.779704 systemd[1]: Closed systemd-networkd.socket. Feb 9 20:58:27.795503 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 20:58:27.795538 systemd[1]: Stopped ignition-disks.service. Feb 9 20:58:27.802662 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 20:58:27.802699 systemd[1]: Stopped ignition-kargs.service. Feb 9 20:58:27.822653 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 20:58:27.822718 systemd[1]: Stopped ignition-setup.service. Feb 9 20:58:27.838836 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 20:58:27.838968 systemd[1]: Stopped initrd-setup-root.service. Feb 9 20:58:27.857456 systemd[1]: Stopping network-cleanup.service... Feb 9 20:58:27.870556 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 20:58:27.870776 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 20:58:27.886906 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 20:58:27.887041 systemd[1]: Stopped systemd-sysctl.service. Feb 9 20:58:27.901987 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 20:58:27.902115 systemd[1]: Stopped systemd-modules-load.service. Feb 9 20:58:27.919095 systemd[1]: Stopping systemd-udevd.service... Feb 9 20:58:27.935903 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 20:58:27.936930 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 20:58:27.936985 systemd[1]: Stopped systemd-udevd.service. Feb 9 20:58:27.954872 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 20:58:27.954905 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 20:58:27.969528 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 20:58:27.969555 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 20:58:27.985555 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 20:58:27.985620 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 20:58:28.000706 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 20:58:28.000803 systemd[1]: Stopped dracut-cmdline.service. Feb 9 20:58:28.015748 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 20:58:28.015880 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 20:58:28.033411 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 20:58:28.046544 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 20:58:28.046689 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 20:58:28.065015 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 20:58:28.065129 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 20:58:28.080660 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 20:58:28.080772 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 20:58:28.097843 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 20:58:28.099011 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 20:58:28.099200 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 20:58:28.214149 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 20:58:28.214374 systemd[1]: Stopped network-cleanup.service. Feb 9 20:58:28.226814 systemd[1]: Reached target initrd-switch-root.target. Feb 9 20:58:28.245042 systemd[1]: Starting initrd-switch-root.service... Feb 9 20:58:28.271675 systemd[1]: Switching root. Feb 9 20:58:28.313750 systemd-journald[268]: Journal stopped Feb 9 20:58:32.205400 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 20:58:32.205427 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 20:58:32.205450 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 20:58:32.205456 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 20:58:32.205461 kernel: SELinux: policy capability open_perms=1 Feb 9 20:58:32.205465 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 20:58:32.205471 kernel: SELinux: policy capability always_check_network=0 Feb 9 20:58:32.205477 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 20:58:32.205482 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 20:58:32.205488 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 20:58:32.205493 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 20:58:32.205499 systemd[1]: Successfully loaded SELinux policy in 293.080ms. Feb 9 20:58:32.205505 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.876ms. Feb 9 20:58:32.205512 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 20:58:32.205519 systemd[1]: Detected architecture x86-64. Feb 9 20:58:32.205525 systemd[1]: Detected first boot. Feb 9 20:58:32.205530 systemd[1]: Hostname set to <ci-3510.3.2-a-a2b06d6def>. Feb 9 20:58:32.205537 systemd[1]: Initializing machine ID from random generator. Feb 9 20:58:32.205542 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 20:58:32.205548 systemd[1]: Populated /etc with preset unit settings. Feb 9 20:58:32.205554 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 20:58:32.205561 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 20:58:32.205567 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 20:58:32.205573 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 9 20:58:32.205579 kernel: audit: type=1334 audit(1707512310.535:93): prog-id=12 op=LOAD Feb 9 20:58:32.205584 kernel: audit: type=1334 audit(1707512310.535:94): prog-id=3 op=UNLOAD Feb 9 20:58:32.205590 kernel: audit: type=1334 audit(1707512310.577:95): prog-id=13 op=LOAD Feb 9 20:58:32.205596 kernel: audit: type=1334 audit(1707512310.619:96): prog-id=14 op=LOAD Feb 9 20:58:32.205601 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 20:58:32.205607 kernel: audit: type=1334 audit(1707512310.619:97): prog-id=4 op=UNLOAD Feb 9 20:58:32.205612 kernel: audit: type=1334 audit(1707512310.619:98): prog-id=5 op=UNLOAD Feb 9 20:58:32.205618 systemd[1]: Stopped initrd-switch-root.service. Feb 9 20:58:32.205624 kernel: audit: type=1131 audit(1707512310.619:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.205629 kernel: audit: type=1334 audit(1707512310.771:100): prog-id=12 op=UNLOAD Feb 9 20:58:32.205635 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 20:58:32.205642 kernel: audit: type=1130 audit(1707512310.778:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.205648 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 20:58:32.205654 kernel: audit: type=1131 audit(1707512310.778:102): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.205660 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 20:58:32.205666 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 20:58:32.205674 systemd[1]: Created slice system-getty.slice. Feb 9 20:58:32.205680 systemd[1]: Created slice system-modprobe.slice. Feb 9 20:58:32.205686 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 20:58:32.205693 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 20:58:32.205699 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 20:58:32.205705 systemd[1]: Created slice user.slice. Feb 9 20:58:32.205711 systemd[1]: Started systemd-ask-password-console.path. Feb 9 20:58:32.205717 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 20:58:32.205723 systemd[1]: Set up automount boot.automount. Feb 9 20:58:32.205729 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 20:58:32.205735 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 20:58:32.205742 systemd[1]: Stopped target initrd-fs.target. Feb 9 20:58:32.205748 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 20:58:32.205754 systemd[1]: Reached target integritysetup.target. Feb 9 20:58:32.205761 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 20:58:32.205766 systemd[1]: Reached target remote-fs.target. Feb 9 20:58:32.205773 systemd[1]: Reached target slices.target. Feb 9 20:58:32.205778 systemd[1]: Reached target swap.target. Feb 9 20:58:32.205784 systemd[1]: Reached target torcx.target. Feb 9 20:58:32.205791 systemd[1]: Reached target veritysetup.target. Feb 9 20:58:32.205797 systemd[1]: Listening on systemd-coredump.socket. Feb 9 20:58:32.205803 systemd[1]: Listening on systemd-initctl.socket. Feb 9 20:58:32.205809 systemd[1]: Listening on systemd-networkd.socket. Feb 9 20:58:32.205816 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 20:58:32.205823 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 20:58:32.205829 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 20:58:32.205835 systemd[1]: Mounting dev-hugepages.mount... Feb 9 20:58:32.205842 systemd[1]: Mounting dev-mqueue.mount... Feb 9 20:58:32.205848 systemd[1]: Mounting media.mount... Feb 9 20:58:32.205854 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 20:58:32.205860 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 20:58:32.205866 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 20:58:32.205873 systemd[1]: Mounting tmp.mount... Feb 9 20:58:32.205880 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 20:58:32.205886 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 20:58:32.205892 systemd[1]: Starting kmod-static-nodes.service... Feb 9 20:58:32.205898 systemd[1]: Starting modprobe@configfs.service... Feb 9 20:58:32.205904 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 20:58:32.205911 systemd[1]: Starting modprobe@drm.service... Feb 9 20:58:32.205917 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 20:58:32.205923 systemd[1]: Starting modprobe@fuse.service... Feb 9 20:58:32.205929 kernel: fuse: init (API version 7.34) Feb 9 20:58:32.205936 systemd[1]: Starting modprobe@loop.service... Feb 9 20:58:32.205942 kernel: loop: module loaded Feb 9 20:58:32.205948 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 20:58:32.205954 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 20:58:32.205960 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 20:58:32.205967 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 20:58:32.205973 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 20:58:32.205979 systemd[1]: Stopped systemd-journald.service. Feb 9 20:58:32.205985 systemd[1]: Starting systemd-journald.service... Feb 9 20:58:32.205992 systemd[1]: Starting systemd-modules-load.service... Feb 9 20:58:32.206000 systemd-journald[1251]: Journal started Feb 9 20:58:32.206024 systemd-journald[1251]: Runtime Journal (/run/log/journal/2afa3269441d444280311337f2bec5e3) is 8.0M, max 636.8M, 628.8M free. Feb 9 20:58:28.675000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 20:58:28.930000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 20:58:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 20:58:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 20:58:28.932000 audit: BPF prog-id=10 op=LOAD Feb 9 20:58:28.932000 audit: BPF prog-id=10 op=UNLOAD Feb 9 20:58:28.932000 audit: BPF prog-id=11 op=LOAD Feb 9 20:58:28.932000 audit: BPF prog-id=11 op=UNLOAD Feb 9 20:58:28.998000 audit[1141]: AVC avc: denied { associate } for pid=1141 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 20:58:28.998000 audit[1141]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001258e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1124 pid=1141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:58:28.998000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 20:58:29.022000 audit[1141]: AVC avc: denied { associate } for pid=1141 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 20:58:29.022000 audit[1141]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001259b9 a2=1ed a3=0 items=2 ppid=1124 pid=1141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:58:29.022000 audit: CWD cwd="/" Feb 9 20:58:29.022000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:29.022000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:29.022000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 20:58:30.535000 audit: BPF prog-id=12 op=LOAD Feb 9 20:58:30.535000 audit: BPF prog-id=3 op=UNLOAD Feb 9 20:58:30.577000 audit: BPF prog-id=13 op=LOAD Feb 9 20:58:30.619000 audit: BPF prog-id=14 op=LOAD Feb 9 20:58:30.619000 audit: BPF prog-id=4 op=UNLOAD Feb 9 20:58:30.619000 audit: BPF prog-id=5 op=UNLOAD Feb 9 20:58:30.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:30.771000 audit: BPF prog-id=12 op=UNLOAD Feb 9 20:58:30.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:30.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.178000 audit: BPF prog-id=15 op=LOAD Feb 9 20:58:32.179000 audit: BPF prog-id=16 op=LOAD Feb 9 20:58:32.179000 audit: BPF prog-id=17 op=LOAD Feb 9 20:58:32.179000 audit: BPF prog-id=13 op=UNLOAD Feb 9 20:58:32.179000 audit: BPF prog-id=14 op=UNLOAD Feb 9 20:58:32.203000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 20:58:32.203000 audit[1251]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffea566220 a2=4000 a3=7fffea5662bc items=0 ppid=1 pid=1251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:58:32.203000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 20:58:30.533729 systemd[1]: Queued start job for default target multi-user.target. Feb 9 20:58:28.997155 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 20:58:30.619917 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 20:58:28.997586 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 20:58:28.997605 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 20:58:28.997631 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 20:58:28.997640 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 20:58:28.997667 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 20:58:28.997678 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 20:58:28.997841 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 20:58:28.997878 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 20:58:28.997889 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 20:58:28.998420 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 20:58:28.998469 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 20:58:28.998497 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 20:58:28.998521 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 20:58:28.998542 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 20:58:28.998554 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 20:58:30.194856 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:30Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 20:58:30.194996 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:30Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 20:58:30.195058 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:30Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 20:58:30.195150 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:30Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 20:58:30.195180 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:30Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 20:58:30.195214 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-09T20:58:30Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 20:58:32.236530 systemd[1]: Starting systemd-network-generator.service... Feb 9 20:58:32.258400 systemd[1]: Starting systemd-remount-fs.service... Feb 9 20:58:32.280406 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 20:58:32.312879 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 20:58:32.312899 systemd[1]: Stopped verity-setup.service. Feb 9 20:58:32.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.347399 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 20:58:32.361399 systemd[1]: Started systemd-journald.service. Feb 9 20:58:32.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.369874 systemd[1]: Mounted dev-hugepages.mount. Feb 9 20:58:32.376607 systemd[1]: Mounted dev-mqueue.mount. Feb 9 20:58:32.383576 systemd[1]: Mounted media.mount. Feb 9 20:58:32.390597 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 20:58:32.399575 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 20:58:32.408576 systemd[1]: Mounted tmp.mount. Feb 9 20:58:32.415638 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 20:58:32.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.423680 systemd[1]: Finished kmod-static-nodes.service. Feb 9 20:58:32.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.431671 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 20:58:32.431774 systemd[1]: Finished modprobe@configfs.service. Feb 9 20:58:32.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.440780 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 20:58:32.440908 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 20:58:32.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.449827 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 20:58:32.449989 systemd[1]: Finished modprobe@drm.service. Feb 9 20:58:32.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.459040 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 20:58:32.459278 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 20:58:32.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.468220 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 20:58:32.468541 systemd[1]: Finished modprobe@fuse.service. Feb 9 20:58:32.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.477168 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 20:58:32.477484 systemd[1]: Finished modprobe@loop.service. Feb 9 20:58:32.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.486174 systemd[1]: Finished systemd-modules-load.service. Feb 9 20:58:32.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.495291 systemd[1]: Finished systemd-network-generator.service. Feb 9 20:58:32.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.504122 systemd[1]: Finished systemd-remount-fs.service. Feb 9 20:58:32.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.513133 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 20:58:32.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.522680 systemd[1]: Reached target network-pre.target. Feb 9 20:58:32.533118 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 20:58:32.542044 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 20:58:32.549544 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 20:58:32.550576 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 20:58:32.558005 systemd[1]: Starting systemd-journal-flush.service... Feb 9 20:58:32.561723 systemd-journald[1251]: Time spent on flushing to /var/log/journal/2afa3269441d444280311337f2bec5e3 is 15.637ms for 1600 entries. Feb 9 20:58:32.561723 systemd-journald[1251]: System Journal (/var/log/journal/2afa3269441d444280311337f2bec5e3) is 8.0M, max 195.6M, 187.6M free. Feb 9 20:58:32.597284 systemd-journald[1251]: Received client request to flush runtime journal. Feb 9 20:58:32.574464 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 20:58:32.575050 systemd[1]: Starting systemd-random-seed.service... Feb 9 20:58:32.585467 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 20:58:32.586038 systemd[1]: Starting systemd-sysctl.service... Feb 9 20:58:32.593270 systemd[1]: Starting systemd-sysusers.service... Feb 9 20:58:32.601020 systemd[1]: Starting systemd-udev-settle.service... Feb 9 20:58:32.608618 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 20:58:32.616502 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 20:58:32.624560 systemd[1]: Finished systemd-journal-flush.service. Feb 9 20:58:32.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.632568 systemd[1]: Finished systemd-random-seed.service. Feb 9 20:58:32.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.640551 systemd[1]: Finished systemd-sysctl.service. Feb 9 20:58:32.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.648541 systemd[1]: Finished systemd-sysusers.service. Feb 9 20:58:32.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.657591 systemd[1]: Reached target first-boot-complete.target. Feb 9 20:58:32.666086 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 20:58:32.675402 udevadm[1267]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 20:58:32.685487 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 20:58:32.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.858113 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 20:58:32.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.866000 audit: BPF prog-id=18 op=LOAD Feb 9 20:58:32.866000 audit: BPF prog-id=19 op=LOAD Feb 9 20:58:32.866000 audit: BPF prog-id=7 op=UNLOAD Feb 9 20:58:32.866000 audit: BPF prog-id=8 op=UNLOAD Feb 9 20:58:32.867648 systemd[1]: Starting systemd-udevd.service... Feb 9 20:58:32.879109 systemd-udevd[1270]: Using default interface naming scheme 'v252'. Feb 9 20:58:32.897604 systemd[1]: Started systemd-udevd.service. Feb 9 20:58:32.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:32.907487 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 20:58:32.908000 audit: BPF prog-id=20 op=LOAD Feb 9 20:58:32.908799 systemd[1]: Starting systemd-networkd.service... Feb 9 20:58:32.945219 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 20:58:32.945270 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 20:58:32.945297 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1326) Feb 9 20:58:32.982061 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 20:58:32.981000 audit: BPF prog-id=21 op=LOAD Feb 9 20:58:32.981000 audit: BPF prog-id=22 op=LOAD Feb 9 20:58:32.981000 audit: BPF prog-id=23 op=LOAD Feb 9 20:58:32.982354 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 20:58:32.982671 systemd[1]: Starting systemd-userdbd.service... Feb 9 20:58:32.998416 kernel: ACPI: button: Power Button [PWRF] Feb 9 20:58:32.943000 audit[1277]: AVC avc: denied { confidentiality } for pid=1277 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 20:58:32.943000 audit[1277]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557f5d41ef80 a1=4d8bc a2=7fd790c61bc5 a3=5 items=42 ppid=1270 pid=1277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:58:32.943000 audit: CWD cwd="/" Feb 9 20:58:32.943000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=1 name=(null) inode=26841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=2 name=(null) inode=26841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=3 name=(null) inode=26842 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=4 name=(null) inode=26841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=5 name=(null) inode=26843 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=6 name=(null) inode=26841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=7 name=(null) inode=26844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=8 name=(null) inode=26844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=9 name=(null) inode=26845 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=10 name=(null) inode=26844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=11 name=(null) inode=26846 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=12 name=(null) inode=26844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=13 name=(null) inode=26847 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=14 name=(null) inode=26844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=15 name=(null) inode=26848 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=16 name=(null) inode=26844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=17 name=(null) inode=26849 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=18 name=(null) inode=26841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=19 name=(null) inode=26850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=20 name=(null) inode=26850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=21 name=(null) inode=26851 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=22 name=(null) inode=26850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=23 name=(null) inode=26852 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=24 name=(null) inode=26850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=25 name=(null) inode=26853 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=26 name=(null) inode=26850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=27 name=(null) inode=26854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=28 name=(null) inode=26850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=29 name=(null) inode=26855 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=30 name=(null) inode=26841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=31 name=(null) inode=26856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=32 name=(null) inode=26856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=33 name=(null) inode=26857 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=34 name=(null) inode=26856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=35 name=(null) inode=26858 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=36 name=(null) inode=26856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=37 name=(null) inode=26859 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=38 name=(null) inode=26856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=39 name=(null) inode=26860 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=40 name=(null) inode=26856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PATH item=41 name=(null) inode=26861 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 20:58:32.943000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 20:58:33.050403 kernel: IPMI message handler: version 39.2 Feb 9 20:58:33.050466 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 20:58:33.051824 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 20:58:33.069363 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 20:58:33.086360 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 20:58:33.090051 systemd[1]: Started systemd-userdbd.service. Feb 9 20:58:33.105428 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 20:58:33.105558 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 20:58:33.121356 kernel: ipmi device interface Feb 9 20:58:33.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:33.155357 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 20:58:33.155389 kernel: ipmi_si: IPMI System Interface driver Feb 9 20:58:33.185705 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 20:58:33.185851 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 20:58:33.218736 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 20:58:33.235219 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 20:58:33.235348 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 20:58:33.275355 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 9 20:58:33.314626 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 20:58:33.314712 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 20:58:33.314725 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 20:58:33.376947 kernel: intel_rapl_common: Found RAPL domain package Feb 9 20:58:33.376991 kernel: intel_rapl_common: Found RAPL domain core Feb 9 20:58:33.377004 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 20:58:33.377100 kernel: intel_rapl_common: Found RAPL domain uncore Feb 9 20:58:33.448390 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 9 20:58:33.448525 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 20:58:33.485382 systemd-networkd[1303]: bond0: netdev ready Feb 9 20:58:33.487456 systemd-networkd[1303]: lo: Link UP Feb 9 20:58:33.487458 systemd-networkd[1303]: lo: Gained carrier Feb 9 20:58:33.487921 systemd-networkd[1303]: Enumeration completed Feb 9 20:58:33.487995 systemd[1]: Started systemd-networkd.service. Feb 9 20:58:33.488196 systemd-networkd[1303]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 20:58:33.490287 systemd-networkd[1303]: enp2s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:79:43:69.network. Feb 9 20:58:33.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:33.498091 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 20:58:33.590389 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 20:58:33.608389 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 20:58:33.610586 systemd[1]: Finished systemd-udev-settle.service. Feb 9 20:58:33.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:33.619047 systemd[1]: Starting lvm2-activation-early.service... Feb 9 20:58:33.634530 lvm[1377]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 20:58:33.661751 systemd[1]: Finished lvm2-activation-early.service. Feb 9 20:58:33.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:33.671444 systemd[1]: Reached target cryptsetup.target. Feb 9 20:58:33.681043 systemd[1]: Starting lvm2-activation.service... Feb 9 20:58:33.682896 lvm[1378]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 20:58:33.718730 systemd[1]: Finished lvm2-activation.service. Feb 9 20:58:33.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:33.727464 systemd[1]: Reached target local-fs-pre.target. Feb 9 20:58:33.736445 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 20:58:33.736458 systemd[1]: Reached target local-fs.target. Feb 9 20:58:33.745445 systemd[1]: Reached target machines.target. Feb 9 20:58:33.754972 systemd[1]: Starting ldconfig.service... Feb 9 20:58:33.762048 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 20:58:33.762068 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 20:58:33.762599 systemd[1]: Starting systemd-boot-update.service... Feb 9 20:58:33.770945 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 20:58:33.780996 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 20:58:33.781108 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 20:58:33.781131 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 20:58:33.781933 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 20:58:33.782177 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1380 (bootctl) Feb 9 20:58:33.782935 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 20:58:33.790947 systemd-tmpfiles[1384]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 20:58:33.793480 systemd-tmpfiles[1384]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 20:58:33.794794 systemd-tmpfiles[1384]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 20:58:33.801783 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 20:58:33.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:33.811450 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 20:58:33.811787 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 20:58:33.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:33.861944 systemd-fsck[1388]: fsck.fat 4.2 (2021-01-31) Feb 9 20:58:33.861944 systemd-fsck[1388]: /dev/sdb1: 789 files, 115339/258078 clusters Feb 9 20:58:33.862622 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 20:58:33.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:33.874156 systemd[1]: Mounting boot.mount... Feb 9 20:58:33.884944 systemd[1]: Mounted boot.mount. Feb 9 20:58:33.902606 systemd[1]: Finished systemd-boot-update.service. Feb 9 20:58:33.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:33.933203 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 20:58:33.945396 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 20:58:33.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 20:58:33.962238 systemd[1]: Starting audit-rules.service... Feb 9 20:58:33.970356 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 9 20:58:33.971193 systemd-networkd[1303]: enp2s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:79:43:68.network. Feb 9 20:58:33.976964 systemd[1]: Starting clean-ca-certificates.service... Feb 9 20:58:33.980000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 20:58:33.980000 audit[1408]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb2c9bb80 a2=420 a3=0 items=0 ppid=1392 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 20:58:33.980000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 20:58:33.981130 augenrules[1408]: No rules Feb 9 20:58:33.985973 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 20:58:33.995361 systemd[1]: Starting systemd-resolved.service... Feb 9 20:58:34.003393 systemd[1]: Starting systemd-timesyncd.service... Feb 9 20:58:34.019077 systemd[1]: Starting systemd-update-utmp.service... Feb 9 20:58:34.029357 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 20:58:34.036867 systemd[1]: Finished audit-rules.service. Feb 9 20:58:34.044576 systemd[1]: Finished clean-ca-certificates.service. Feb 9 20:58:34.052553 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 20:58:34.062023 ldconfig[1379]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 20:58:34.063691 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 20:58:34.064252 systemd[1]: Finished systemd-update-utmp.service. Feb 9 20:58:34.072583 systemd[1]: Finished ldconfig.service. Feb 9 20:58:34.080732 systemd[1]: Starting systemd-update-done.service... Feb 9 20:58:34.088538 systemd[1]: Finished systemd-update-done.service. Feb 9 20:58:34.094096 systemd-resolved[1414]: Positive Trust Anchors: Feb 9 20:58:34.094101 systemd-resolved[1414]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 20:58:34.094120 systemd-resolved[1414]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 20:58:34.096537 systemd[1]: Started systemd-timesyncd.service. Feb 9 20:58:34.098302 systemd-resolved[1414]: Using system hostname 'ci-3510.3.2-a-a2b06d6def'. Feb 9 20:58:34.104623 systemd[1]: Reached target time-set.target. Feb 9 20:58:34.141393 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 20:58:34.141537 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 20:58:34.162416 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 9 20:58:34.199727 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 20:58:34.201490 systemd-networkd[1303]: bond0: Link UP Feb 9 20:58:34.201700 systemd-networkd[1303]: enp2s0f1np1: Link UP Feb 9 20:58:34.201854 systemd-networkd[1303]: enp2s0f1np1: Gained carrier Feb 9 20:58:34.202202 systemd[1]: Started systemd-resolved.service. Feb 9 20:58:34.202853 systemd-networkd[1303]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:79:43:68.network. Feb 9 20:58:34.210484 systemd[1]: Reached target network.target. Feb 9 20:58:34.218442 systemd[1]: Reached target nss-lookup.target. Feb 9 20:58:34.226456 systemd[1]: Reached target sysinit.target. Feb 9 20:58:34.234473 systemd[1]: Started motdgen.path. Feb 9 20:58:34.246444 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 20:58:34.259355 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.275495 systemd[1]: Started logrotate.timer. Feb 9 20:58:34.280354 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.293473 systemd[1]: Started mdadm.timer. Feb 9 20:58:34.302423 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.315430 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 20:58:34.323354 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.337421 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 20:58:34.337440 systemd[1]: Reached target paths.target. Feb 9 20:58:34.343359 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.357422 systemd[1]: Reached target timers.target. Feb 9 20:58:34.364354 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.377565 systemd[1]: Listening on dbus.socket. Feb 9 20:58:34.384353 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.399042 systemd[1]: Starting docker.socket... Feb 9 20:58:34.403355 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.418912 systemd[1]: Listening on sshd.socket. Feb 9 20:58:34.423354 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.437506 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 20:58:34.437715 systemd[1]: Listening on docker.socket. Feb 9 20:58:34.443377 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.456482 systemd[1]: Reached target sockets.target. Feb 9 20:58:34.462353 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.477451 systemd[1]: Reached target basic.target. Feb 9 20:58:34.481353 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.494446 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 20:58:34.494462 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 20:58:34.494939 systemd[1]: Starting containerd.service... Feb 9 20:58:34.499372 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.513854 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 20:58:34.518391 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.533935 systemd[1]: Starting coreos-metadata.service... Feb 9 20:58:34.536355 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.541027 coreos-metadata[1421]: Feb 09 20:58:34.541 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 20:58:34.544503 coreos-metadata[1421]: Feb 09 20:58:34.544 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 20:58:34.550992 systemd[1]: Starting dbus.service... Feb 9 20:58:34.555356 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 9 20:58:34.555404 kernel: bond0: (slave enp2s0f1np1): link status definitely down, disabling slave Feb 9 20:58:34.555416 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 20:58:34.562255 coreos-metadata[1424]: Feb 09 20:58:34.562 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 20:58:34.562840 coreos-metadata[1424]: Feb 09 20:58:34.562 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 20:58:34.567939 dbus-daemon[1428]: [system] SELinux support is enabled Feb 9 20:58:34.585985 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 20:58:34.590562 jq[1430]: false Feb 9 20:58:34.605291 systemd-networkd[1303]: enp2s0f0np0: Link UP Feb 9 20:58:34.605410 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 20:58:34.605424 kernel: bond0: active interface up! Feb 9 20:58:34.605566 systemd-networkd[1303]: bond0: Gained carrier Feb 9 20:58:34.605683 systemd-networkd[1303]: enp2s0f0np0: Gained carrier Feb 9 20:58:34.605714 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:34.625008 systemd[1]: Starting extend-filesystems.service... Feb 9 20:58:34.625515 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:34.625652 systemd-networkd[1303]: enp2s0f1np1: Link DOWN Feb 9 20:58:34.625654 systemd-networkd[1303]: enp2s0f1np1: Lost carrier Feb 9 20:58:34.631409 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 20:58:34.631980 extend-filesystems[1432]: Found sda Feb 9 20:58:34.652437 extend-filesystems[1432]: Found sdb Feb 9 20:58:34.652437 extend-filesystems[1432]: Found sdb1 Feb 9 20:58:34.652437 extend-filesystems[1432]: Found sdb2 Feb 9 20:58:34.652437 extend-filesystems[1432]: Found sdb3 Feb 9 20:58:34.652437 extend-filesystems[1432]: Found usr Feb 9 20:58:34.652437 extend-filesystems[1432]: Found sdb4 Feb 9 20:58:34.652437 extend-filesystems[1432]: Found sdb6 Feb 9 20:58:34.652437 extend-filesystems[1432]: Found sdb7 Feb 9 20:58:34.652437 extend-filesystems[1432]: Found sdb9 Feb 9 20:58:34.652437 extend-filesystems[1432]: Checking size of /dev/sdb9 Feb 9 20:58:34.652437 extend-filesystems[1432]: Resized partition /dev/sdb9 Feb 9 20:58:34.778397 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 9 20:58:34.631982 systemd[1]: Starting motdgen.service... Feb 9 20:58:34.778508 extend-filesystems[1446]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 20:58:34.801413 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 20:58:34.634507 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:34.634543 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:34.634784 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:34.639043 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 20:58:34.670135 systemd[1]: Starting sshd-keygen.service... Feb 9 20:58:34.801812 update_engine[1458]: I0209 20:58:34.775889 1458 main.cc:92] Flatcar Update Engine starting Feb 9 20:58:34.801812 update_engine[1458]: I0209 20:58:34.778765 1458 update_check_scheduler.cc:74] Next update check in 7m26s Feb 9 20:58:34.688827 systemd[1]: Starting systemd-logind.service... Feb 9 20:58:34.801977 jq[1459]: true Feb 9 20:58:34.708474 systemd-logind[1456]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 20:58:34.708485 systemd-logind[1456]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 20:58:34.708494 systemd-logind[1456]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 20:58:34.708637 systemd-logind[1456]: New seat seat0. Feb 9 20:58:34.713391 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 20:58:34.713985 systemd[1]: Starting tcsd.service... Feb 9 20:58:34.725589 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 20:58:34.725927 systemd[1]: Starting update-engine.service... Feb 9 20:58:34.741025 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 20:58:34.755703 systemd[1]: Started dbus.service. Feb 9 20:58:34.772327 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 20:58:34.772417 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 20:58:34.772559 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 20:58:34.772632 systemd[1]: Finished motdgen.service. Feb 9 20:58:34.793887 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 20:58:34.793971 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 20:58:34.797771 systemd-networkd[1303]: enp2s0f1np1: Link UP Feb 9 20:58:34.797949 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:34.797977 systemd-networkd[1303]: enp2s0f1np1: Gained carrier Feb 9 20:58:34.798001 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:34.811495 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:34.811533 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:34.811641 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:34.812156 jq[1461]: true Feb 9 20:58:34.813544 dbus-daemon[1428]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 20:58:34.818394 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 20:58:34.818580 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 20:58:34.820238 systemd[1]: Started update-engine.service. Feb 9 20:58:34.821575 env[1462]: time="2024-02-09T20:58:34.821554220Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 20:58:34.829831 env[1462]: time="2024-02-09T20:58:34.829817873Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 20:58:34.830184 env[1462]: time="2024-02-09T20:58:34.830176260Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 20:58:34.830784 env[1462]: time="2024-02-09T20:58:34.830770092Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 20:58:34.830806 env[1462]: time="2024-02-09T20:58:34.830785432Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 20:58:34.830906 env[1462]: time="2024-02-09T20:58:34.830895869Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 20:58:34.830928 env[1462]: time="2024-02-09T20:58:34.830906552Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 20:58:34.830928 env[1462]: time="2024-02-09T20:58:34.830913730Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 20:58:34.830928 env[1462]: time="2024-02-09T20:58:34.830919092Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 20:58:34.839699 env[1462]: time="2024-02-09T20:58:34.839689175Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 20:58:34.839823 env[1462]: time="2024-02-09T20:58:34.839814772Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 20:58:34.839892 env[1462]: time="2024-02-09T20:58:34.839881819Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 20:58:34.839912 env[1462]: time="2024-02-09T20:58:34.839892430Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 20:58:34.839930 env[1462]: time="2024-02-09T20:58:34.839919783Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 20:58:34.839930 env[1462]: time="2024-02-09T20:58:34.839926651Z" level=info msg="metadata content store policy set" policy=shared Feb 9 20:58:34.846320 kernel: bond0: (slave enp2s0f1np1): link status up, enabling it in 200 ms Feb 9 20:58:34.847804 kernel: bond0: (slave enp2s0f1np1): invalid new link 3 on slave Feb 9 20:58:34.852132 systemd[1]: Started systemd-logind.service. Feb 9 20:58:34.852182 env[1462]: time="2024-02-09T20:58:34.852172934Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 20:58:34.852203 env[1462]: time="2024-02-09T20:58:34.852187404Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 20:58:34.852203 env[1462]: time="2024-02-09T20:58:34.852195211Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 20:58:34.852234 bash[1488]: Updated "/home/core/.ssh/authorized_keys" Feb 9 20:58:34.852309 env[1462]: time="2024-02-09T20:58:34.852212207Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 20:58:34.852309 env[1462]: time="2024-02-09T20:58:34.852220496Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 20:58:34.852309 env[1462]: time="2024-02-09T20:58:34.852228117Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 20:58:34.852309 env[1462]: time="2024-02-09T20:58:34.852234863Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 20:58:34.852309 env[1462]: time="2024-02-09T20:58:34.852242126Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 20:58:34.852309 env[1462]: time="2024-02-09T20:58:34.852248663Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 20:58:34.852309 env[1462]: time="2024-02-09T20:58:34.852255858Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 20:58:34.852309 env[1462]: time="2024-02-09T20:58:34.852262627Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 20:58:34.852309 env[1462]: time="2024-02-09T20:58:34.852269969Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 20:58:34.852485 env[1462]: time="2024-02-09T20:58:34.852315144Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 20:58:34.852485 env[1462]: time="2024-02-09T20:58:34.852365926Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 20:58:34.852526 env[1462]: time="2024-02-09T20:58:34.852490394Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 20:58:34.852526 env[1462]: time="2024-02-09T20:58:34.852504600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852526 env[1462]: time="2024-02-09T20:58:34.852513965Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 20:58:34.852572 env[1462]: time="2024-02-09T20:58:34.852539806Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852572 env[1462]: time="2024-02-09T20:58:34.852547108Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852572 env[1462]: time="2024-02-09T20:58:34.852553778Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852572 env[1462]: time="2024-02-09T20:58:34.852560007Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852572 env[1462]: time="2024-02-09T20:58:34.852566670Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852644 env[1462]: time="2024-02-09T20:58:34.852573135Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852644 env[1462]: time="2024-02-09T20:58:34.852580059Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852644 env[1462]: time="2024-02-09T20:58:34.852586638Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852644 env[1462]: time="2024-02-09T20:58:34.852594844Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 20:58:34.852705 env[1462]: time="2024-02-09T20:58:34.852655151Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852705 env[1462]: time="2024-02-09T20:58:34.852664048Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852705 env[1462]: time="2024-02-09T20:58:34.852670193Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852705 env[1462]: time="2024-02-09T20:58:34.852679777Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 20:58:34.852705 env[1462]: time="2024-02-09T20:58:34.852687302Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 20:58:34.852705 env[1462]: time="2024-02-09T20:58:34.852693110Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 20:58:34.852705 env[1462]: time="2024-02-09T20:58:34.852702115Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 20:58:34.852805 env[1462]: time="2024-02-09T20:58:34.852722476Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 20:58:34.852850 env[1462]: time="2024-02-09T20:58:34.852824579Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.852855613Z" level=info msg="Connect containerd service" Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.852871446Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.853132867Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.853246699Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.853231000Z" level=info msg="Start subscribing containerd event" Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.853268193Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.853269476Z" level=info msg="Start recovering state" Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.853292022Z" level=info msg="containerd successfully booted in 0.032132s" Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.853305369Z" level=info msg="Start event monitor" Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.853316409Z" level=info msg="Start snapshots syncer" Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.853321436Z" level=info msg="Start cni network conf syncer for default" Feb 9 20:58:34.854572 env[1462]: time="2024-02-09T20:58:34.853328354Z" level=info msg="Start streaming server" Feb 9 20:58:34.860484 systemd[1]: Started containerd.service. Feb 9 20:58:34.867527 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 20:58:34.879149 systemd[1]: Started locksmithd.service. Feb 9 20:58:34.885485 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 20:58:34.885572 systemd[1]: Reached target system-config.target. Feb 9 20:58:34.893461 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 20:58:34.893533 systemd[1]: Reached target user-config.target. Feb 9 20:58:34.937842 locksmithd[1497]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 20:58:35.074356 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 20:58:35.146356 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 9 20:58:35.174577 extend-filesystems[1446]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 9 20:58:35.174577 extend-filesystems[1446]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 20:58:35.174577 extend-filesystems[1446]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 9 20:58:35.213425 extend-filesystems[1432]: Resized filesystem in /dev/sdb9 Feb 9 20:58:35.174957 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 20:58:35.175042 systemd[1]: Finished extend-filesystems.service. Feb 9 20:58:35.362851 sshd_keygen[1455]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 20:58:35.374495 systemd[1]: Finished sshd-keygen.service. Feb 9 20:58:35.383247 systemd[1]: Starting issuegen.service... Feb 9 20:58:35.390646 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 20:58:35.390740 systemd[1]: Finished issuegen.service. Feb 9 20:58:35.399162 systemd[1]: Starting systemd-user-sessions.service... Feb 9 20:58:35.407651 systemd[1]: Finished systemd-user-sessions.service. Feb 9 20:58:35.416051 systemd[1]: Started getty@tty1.service. Feb 9 20:58:35.423116 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 20:58:35.431638 systemd[1]: Reached target getty.target. Feb 9 20:58:35.544795 coreos-metadata[1421]: Feb 09 20:58:35.544 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 20:58:35.563159 coreos-metadata[1424]: Feb 09 20:58:35.563 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 20:58:36.039449 systemd-networkd[1303]: bond0: Gained IPv6LL Feb 9 20:58:36.039683 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:36.679756 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:36.679814 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:36.680718 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 20:58:36.690933 systemd[1]: Reached target network-online.target. Feb 9 20:58:36.701383 systemd[1]: Starting docker.service... Feb 9 20:58:36.719890 env[1519]: time="2024-02-09T20:58:36.719830955Z" level=info msg="Starting up" Feb 9 20:58:36.720496 env[1519]: time="2024-02-09T20:58:36.720455706Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 20:58:36.720496 env[1519]: time="2024-02-09T20:58:36.720465631Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 20:58:36.720496 env[1519]: time="2024-02-09T20:58:36.720478013Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock <nil> 0 <nil>}] <nil> <nil>}" module=grpc Feb 9 20:58:36.720496 env[1519]: time="2024-02-09T20:58:36.720484290Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 20:58:36.721309 env[1519]: time="2024-02-09T20:58:36.721299457Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 20:58:36.721309 env[1519]: time="2024-02-09T20:58:36.721308151Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 20:58:36.721373 env[1519]: time="2024-02-09T20:58:36.721315503Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock <nil> 0 <nil>}] <nil> <nil>}" module=grpc Feb 9 20:58:36.721373 env[1519]: time="2024-02-09T20:58:36.721321741Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 20:58:36.736614 env[1519]: time="2024-02-09T20:58:36.736575271Z" level=info msg="Loading containers: start." Feb 9 20:58:36.822366 kernel: Initializing XFRM netlink socket Feb 9 20:58:36.862386 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 20:58:36.868373 env[1519]: time="2024-02-09T20:58:36.868355639Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 20:58:36.869103 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:36.869163 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:36.872313 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:36.872406 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:36.911284 systemd-networkd[1303]: docker0: Link UP Feb 9 20:58:36.911400 systemd-timesyncd[1415]: Network configuration changed, trying to establish connection. Feb 9 20:58:36.915691 env[1519]: time="2024-02-09T20:58:36.915677229Z" level=info msg="Loading containers: done." Feb 9 20:58:36.921666 env[1519]: time="2024-02-09T20:58:36.921619631Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 20:58:36.921750 env[1519]: time="2024-02-09T20:58:36.921717354Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 20:58:36.921774 env[1519]: time="2024-02-09T20:58:36.921762337Z" level=info msg="Daemon has completed initialization" Feb 9 20:58:36.928800 systemd[1]: Started docker.service. Feb 9 20:58:36.932758 env[1519]: time="2024-02-09T20:58:36.932686498Z" level=info msg="API listen on /run/docker.sock" Feb 9 20:58:40.444002 login[1518]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 20:58:40.451767 login[1517]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 20:58:40.452084 systemd-logind[1456]: New session 1 of user core. Feb 9 20:58:40.452623 systemd[1]: Created slice user-500.slice. Feb 9 20:58:40.453200 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 20:58:40.454288 systemd-logind[1456]: New session 2 of user core. Feb 9 20:58:40.458510 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 20:58:40.459181 systemd[1]: Starting user@500.service... Feb 9 20:58:40.461096 (systemd)[1647]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:58:40.527560 systemd[1647]: Queued start job for default target default.target. Feb 9 20:58:40.527787 systemd[1647]: Reached target paths.target. Feb 9 20:58:40.527798 systemd[1647]: Reached target sockets.target. Feb 9 20:58:40.527806 systemd[1647]: Reached target timers.target. Feb 9 20:58:40.527813 systemd[1647]: Reached target basic.target. Feb 9 20:58:40.527832 systemd[1647]: Reached target default.target. Feb 9 20:58:40.527845 systemd[1647]: Startup finished in 63ms. Feb 9 20:58:40.527894 systemd[1]: Started user@500.service. Feb 9 20:58:40.528460 systemd[1]: Started session-1.scope. Feb 9 20:58:40.528937 systemd[1]: Started session-2.scope. Feb 9 20:58:41.672568 coreos-metadata[1421]: Feb 09 20:58:41.672 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 20:58:41.673393 coreos-metadata[1424]: Feb 09 20:58:41.672 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 20:58:42.358405 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 9 20:58:42.358588 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 9 20:58:42.538552 systemd[1]: Created slice system-sshd.slice. Feb 9 20:58:42.539161 systemd[1]: Started sshd@0-139.178.89.23:22-139.178.89.65:49594.service. Feb 9 20:58:42.583565 sshd[1668]: Accepted publickey for core from 139.178.89.65 port 49594 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:58:42.584735 sshd[1668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:58:42.588694 systemd-logind[1456]: New session 3 of user core. Feb 9 20:58:42.589713 systemd[1]: Started session-3.scope. Feb 9 20:58:42.650046 systemd[1]: Started sshd@1-139.178.89.23:22-139.178.89.65:49602.service. Feb 9 20:58:42.687294 sshd[1673]: Accepted publickey for core from 139.178.89.65 port 49602 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:58:42.688027 sshd[1673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:58:42.690432 systemd-logind[1456]: New session 4 of user core. Feb 9 20:58:42.690976 systemd[1]: Started session-4.scope. Feb 9 20:58:42.743920 sshd[1673]: pam_unix(sshd:session): session closed for user core Feb 9 20:58:42.745312 systemd[1]: sshd@1-139.178.89.23:22-139.178.89.65:49602.service: Deactivated successfully. Feb 9 20:58:42.745638 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 20:58:42.746003 systemd-logind[1456]: Session 4 logged out. Waiting for processes to exit. Feb 9 20:58:42.746510 systemd[1]: Started sshd@2-139.178.89.23:22-139.178.89.65:49604.service. Feb 9 20:58:42.747058 systemd-logind[1456]: Removed session 4. Feb 9 20:58:42.780084 sshd[1679]: Accepted publickey for core from 139.178.89.65 port 49604 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:58:42.781128 sshd[1679]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:58:42.784991 systemd-logind[1456]: New session 5 of user core. Feb 9 20:58:42.785807 systemd[1]: Started session-5.scope. Feb 9 20:58:42.843224 sshd[1679]: pam_unix(sshd:session): session closed for user core Feb 9 20:58:42.844510 systemd[1]: sshd@2-139.178.89.23:22-139.178.89.65:49604.service: Deactivated successfully. Feb 9 20:58:42.844878 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 20:58:42.845240 systemd-logind[1456]: Session 5 logged out. Waiting for processes to exit. Feb 9 20:58:42.845838 systemd-logind[1456]: Removed session 5. Feb 9 20:58:43.672967 coreos-metadata[1424]: Feb 09 20:58:43.672 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 9 20:58:43.673854 coreos-metadata[1421]: Feb 09 20:58:43.672 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 9 20:58:43.698553 coreos-metadata[1424]: Feb 09 20:58:43.698 INFO Fetch successful Feb 9 20:58:43.702176 coreos-metadata[1421]: Feb 09 20:58:43.702 INFO Fetch successful Feb 9 20:58:43.720691 systemd[1]: Finished coreos-metadata.service. Feb 9 20:58:43.721569 systemd[1]: Starting etcd-member.service... Feb 9 20:58:43.722246 systemd[1]: Started packet-phone-home.service. Feb 9 20:58:43.725341 unknown[1421]: wrote ssh authorized keys file for user: core Feb 9 20:58:43.730161 curl[1688]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 20:58:43.730310 curl[1688]: Dload Upload Total Spent Left Speed Feb 9 20:58:43.740398 etcd-wrapper[1692]: Error response from daemon: No such container: etcd-member Feb 9 20:58:43.743054 update-ssh-keys[1698]: Updated "/home/core/.ssh/authorized_keys" Feb 9 20:58:43.743315 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 20:58:43.751993 etcd-wrapper[1706]: Error: No such container: etcd-member Feb 9 20:58:43.824246 etcd-wrapper[1729]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 9 20:58:43.914727 curl[1688]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 20:58:43.917125 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 20:58:45.066287 etcd-wrapper[1729]: v3.5.0: Pulling from coreos/etcd Feb 9 20:58:45.067352 systemd[1]: Started sshd@3-139.178.89.23:22-175.139.200.245:57332.service. Feb 9 20:58:45.352568 etcd-wrapper[1729]: 1813d21adc01: Pulling fs layer Feb 9 20:58:45.352568 etcd-wrapper[1729]: 6e96907ab677: Pulling fs layer Feb 9 20:58:45.352568 etcd-wrapper[1729]: 444ed0ea8673: Pulling fs layer Feb 9 20:58:45.352568 etcd-wrapper[1729]: 0fd2df5633f0: Pulling fs layer Feb 9 20:58:45.352568 etcd-wrapper[1729]: 8cc22b9456bb: Pulling fs layer Feb 9 20:58:45.352568 etcd-wrapper[1729]: 7ac70aecd290: Pulling fs layer Feb 9 20:58:45.352568 etcd-wrapper[1729]: 4b376c64dfe4: Pulling fs layer Feb 9 20:58:45.352568 etcd-wrapper[1729]: 0fd2df5633f0: Waiting Feb 9 20:58:45.353753 etcd-wrapper[1729]: 7ac70aecd290: Waiting Feb 9 20:58:45.353753 etcd-wrapper[1729]: 8cc22b9456bb: Waiting Feb 9 20:58:45.353753 etcd-wrapper[1729]: 4b376c64dfe4: Waiting Feb 9 20:58:45.696908 etcd-wrapper[1729]: 6e96907ab677: Verifying Checksum Feb 9 20:58:45.696908 etcd-wrapper[1729]: 6e96907ab677: Download complete Feb 9 20:58:45.737434 etcd-wrapper[1729]: 1813d21adc01: Download complete Feb 9 20:58:46.054735 etcd-wrapper[1729]: 0fd2df5633f0: Verifying Checksum Feb 9 20:58:46.054735 etcd-wrapper[1729]: 0fd2df5633f0: Download complete Feb 9 20:58:46.057797 etcd-wrapper[1729]: 444ed0ea8673: Verifying Checksum Feb 9 20:58:46.057797 etcd-wrapper[1729]: 444ed0ea8673: Download complete Feb 9 20:58:46.225878 sshd[1745]: Invalid user baranbarut from 175.139.200.245 port 57332 Feb 9 20:58:46.227322 sshd[1745]: pam_faillock(sshd:auth): User unknown Feb 9 20:58:46.227563 sshd[1745]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:58:46.227586 sshd[1745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.200.245 Feb 9 20:58:46.227783 sshd[1745]: pam_faillock(sshd:auth): User unknown Feb 9 20:58:46.236312 etcd-wrapper[1729]: 1813d21adc01: Pull complete Feb 9 20:58:46.363163 etcd-wrapper[1729]: 4b376c64dfe4: Verifying Checksum Feb 9 20:58:46.363163 etcd-wrapper[1729]: 4b376c64dfe4: Download complete Feb 9 20:58:46.456835 systemd[1]: var-lib-docker-overlay2-32c91178adacc58139b68572e375274c24a11b1451689ec7d5238e3811fc129f-merged.mount: Deactivated successfully. Feb 9 20:58:46.672967 etcd-wrapper[1729]: 7ac70aecd290: Download complete Feb 9 20:58:46.694481 etcd-wrapper[1729]: 6e96907ab677: Pull complete Feb 9 20:58:46.729738 etcd-wrapper[1729]: 8cc22b9456bb: Verifying Checksum Feb 9 20:58:46.729738 etcd-wrapper[1729]: 8cc22b9456bb: Download complete Feb 9 20:58:46.848651 systemd[1]: var-lib-docker-overlay2-d89edb2b2f1b66b86308c0c6ae3df653186c90ac8c8111d8ad90f900fa5fec65-merged.mount: Deactivated successfully. Feb 9 20:58:46.888909 etcd-wrapper[1729]: 444ed0ea8673: Pull complete Feb 9 20:58:47.121196 etcd-wrapper[1729]: 0fd2df5633f0: Pull complete Feb 9 20:58:47.151098 etcd-wrapper[1729]: 8cc22b9456bb: Pull complete Feb 9 20:58:47.200974 etcd-wrapper[1729]: 7ac70aecd290: Pull complete Feb 9 20:58:47.242743 systemd[1]: var-lib-docker-overlay2-5ff66b2eca9777a2b6b7ba64bb9959fe515b0559d41ef8e73f516da48c88dd3b-merged.mount: Deactivated successfully. Feb 9 20:58:47.294708 systemd[1]: var-lib-docker-overlay2-e988adbd4812659e161e18da36dcb63e5f77677f1b6dd25084e10d01dd0b7c46-merged.mount: Deactivated successfully. Feb 9 20:58:47.298982 etcd-wrapper[1729]: 4b376c64dfe4: Pull complete Feb 9 20:58:47.306627 etcd-wrapper[1729]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 9 20:58:47.309050 etcd-wrapper[1729]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 9 20:58:47.323582 systemd[1]: var-lib-docker-overlay2-827a6e9c2b6c35c8a9bee5b10d1bed3865b281a176b18e76153c571d5f9e0dcd\x2dinit-merged.mount: Deactivated successfully. Feb 9 20:58:47.412542 env[1462]: time="2024-02-09T20:58:47.412393627Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 20:58:47.412542 env[1462]: time="2024-02-09T20:58:47.412424483Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 20:58:47.412542 env[1462]: time="2024-02-09T20:58:47.412435499Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 20:58:47.412542 env[1462]: time="2024-02-09T20:58:47.412524188Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/2be1eaec610fe78881b4da84a4c1687dbd1cf78b2263f1fa496d58a916e19b67 pid=1910 runtime=io.containerd.runc.v2 Feb 9 20:58:47.432455 systemd[1]: Started docker-2be1eaec610fe78881b4da84a4c1687dbd1cf78b2263f1fa496d58a916e19b67.scope. Feb 9 20:58:47.508300 etcd-wrapper[1729]: {"level":"info","ts":1707512327.5079768,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 9 20:58:47.508300 etcd-wrapper[1729]: {"level":"info","ts":1707512327.5080774,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"2afa3269441d444280311337f2bec5e3"} Feb 9 20:58:47.508300 etcd-wrapper[1729]: {"level":"warn","ts":1707512327.5081294,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 9 20:58:47.508300 etcd-wrapper[1729]: {"level":"warn","ts":1707512327.5081432,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 9 20:58:47.508300 etcd-wrapper[1729]: {"level":"warn","ts":1707512327.508155,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 9 20:58:47.508300 etcd-wrapper[1729]: {"level":"warn","ts":1707512327.5081663,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 9 20:58:47.508701 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T20:58:47.508Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.17:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.17:2380","--advertise-client-urls=http://10.67.80.17:2379","--discovery=https://discovery.etcd.io/d7cee3726ea182cdff8b68a2273a83e6","--enable-v2=true"]} Feb 9 20:58:47.508701 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T20:58:47.508Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.17:2380"]} Feb 9 20:58:47.508701 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T20:58:47.508Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 9 20:58:47.508912 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T20:58:47.508Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"2afa3269441d444280311337f2bec5e3","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.17:2380"],"listen-peer-urls":["http://10.67.80.17:2380"],"advertise-client-urls":["http://10.67.80.17:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"2afa3269441d444280311337f2bec5e3=http://10.67.80.17:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/d7cee3726ea182cdff8b68a2273a83e6","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/d7cee3726ea182cdff8b68a2273a83e6","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 9 20:58:47.509907 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T20:58:47.509Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"741.788µs"} Feb 9 20:58:48.093052 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T20:58:48.092Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"967872570d3885c9"} Feb 9 20:58:48.093052 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T20:58:48.092Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":1,"needed-peers":2} Feb 9 20:58:48.406706 sshd[1745]: Failed password for invalid user baranbarut from 175.139.200.245 port 57332 ssh2 Feb 9 20:58:50.296394 systemd[1]: Started sshd@4-139.178.89.23:22-101.43.121.33:48134.service. Feb 9 20:58:50.384199 sshd[1745]: Received disconnect from 175.139.200.245 port 57332:11: Bye Bye [preauth] Feb 9 20:58:50.384199 sshd[1745]: Disconnected from invalid user baranbarut 175.139.200.245 port 57332 [preauth] Feb 9 20:58:50.386384 systemd[1]: sshd@3-139.178.89.23:22-175.139.200.245:57332.service: Deactivated successfully. Feb 9 20:58:51.194392 sshd[1960]: Invalid user czc from 101.43.121.33 port 48134 Feb 9 20:58:51.200558 sshd[1960]: pam_faillock(sshd:auth): User unknown Feb 9 20:58:51.201658 sshd[1960]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:58:51.201747 sshd[1960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 20:58:51.202750 sshd[1960]: pam_faillock(sshd:auth): User unknown Feb 9 20:58:52.852265 systemd[1]: Started sshd@5-139.178.89.23:22-139.178.89.65:54564.service. Feb 9 20:58:52.885791 sshd[1964]: Accepted publickey for core from 139.178.89.65 port 54564 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:58:52.886515 sshd[1964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:58:52.888954 systemd-logind[1456]: New session 6 of user core. Feb 9 20:58:52.889462 systemd[1]: Started session-6.scope. Feb 9 20:58:52.940949 sshd[1964]: pam_unix(sshd:session): session closed for user core Feb 9 20:58:52.942413 systemd[1]: sshd@5-139.178.89.23:22-139.178.89.65:54564.service: Deactivated successfully. Feb 9 20:58:52.942730 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 20:58:52.943019 systemd-logind[1456]: Session 6 logged out. Waiting for processes to exit. Feb 9 20:58:52.943565 systemd[1]: Started sshd@6-139.178.89.23:22-139.178.89.65:54578.service. Feb 9 20:58:52.943998 systemd-logind[1456]: Removed session 6. Feb 9 20:58:52.977057 sshd[1970]: Accepted publickey for core from 139.178.89.65 port 54578 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:58:52.978021 sshd[1970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:58:52.981058 systemd-logind[1456]: New session 7 of user core. Feb 9 20:58:52.981670 systemd[1]: Started session-7.scope. Feb 9 20:58:53.046106 sshd[1970]: pam_unix(sshd:session): session closed for user core Feb 9 20:58:53.051789 systemd[1]: sshd@6-139.178.89.23:22-139.178.89.65:54578.service: Deactivated successfully. Feb 9 20:58:53.053505 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 20:58:53.055209 systemd-logind[1456]: Session 7 logged out. Waiting for processes to exit. Feb 9 20:58:53.057442 systemd-logind[1456]: Removed session 7. Feb 9 20:58:53.733282 sshd[1960]: Failed password for invalid user czc from 101.43.121.33 port 48134 ssh2 Feb 9 20:58:55.984717 sshd[1960]: Received disconnect from 101.43.121.33 port 48134:11: Bye Bye [preauth] Feb 9 20:58:55.984717 sshd[1960]: Disconnected from invalid user czc 101.43.121.33 port 48134 [preauth] Feb 9 20:58:55.987301 systemd[1]: sshd@4-139.178.89.23:22-101.43.121.33:48134.service: Deactivated successfully. Feb 9 20:58:58.643778 systemd[1]: Started sshd@7-139.178.89.23:22-124.222.159.25:35726.service. Feb 9 20:58:58.904237 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T20:58:58.903Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"59ba8d9751c40a95"} Feb 9 20:58:58.904237 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T20:58:58.903Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Feb 9 20:58:59.477476 sshd[1978]: Invalid user eskat from 124.222.159.25 port 35726 Feb 9 20:58:59.483780 sshd[1978]: pam_faillock(sshd:auth): User unknown Feb 9 20:58:59.484785 sshd[1978]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:58:59.484872 sshd[1978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.159.25 Feb 9 20:58:59.485808 sshd[1978]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:01.449035 sshd[1978]: Failed password for invalid user eskat from 124.222.159.25 port 35726 ssh2 Feb 9 20:59:01.885724 sshd[1978]: Received disconnect from 124.222.159.25 port 35726:11: Bye Bye [preauth] Feb 9 20:59:01.885724 sshd[1978]: Disconnected from invalid user eskat 124.222.159.25 port 35726 [preauth] Feb 9 20:59:01.888148 systemd[1]: sshd@7-139.178.89.23:22-124.222.159.25:35726.service: Deactivated successfully. Feb 9 20:59:03.053803 systemd[1]: Started sshd@8-139.178.89.23:22-139.178.89.65:54482.service. Feb 9 20:59:03.087475 sshd[1982]: Accepted publickey for core from 139.178.89.65 port 54482 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:03.105103 sshd[1982]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:03.108071 systemd-logind[1456]: New session 8 of user core. Feb 9 20:59:03.108578 systemd[1]: Started session-8.scope. Feb 9 20:59:03.162256 sshd[1982]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:03.163752 systemd[1]: sshd@8-139.178.89.23:22-139.178.89.65:54482.service: Deactivated successfully. Feb 9 20:59:03.164043 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 20:59:03.164293 systemd-logind[1456]: Session 8 logged out. Waiting for processes to exit. Feb 9 20:59:03.164819 systemd[1]: Started sshd@9-139.178.89.23:22-139.178.89.65:54492.service. Feb 9 20:59:03.165170 systemd-logind[1456]: Removed session 8. Feb 9 20:59:03.197871 sshd[1988]: Accepted publickey for core from 139.178.89.65 port 54492 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:03.198816 sshd[1988]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:03.202084 systemd-logind[1456]: New session 9 of user core. Feb 9 20:59:03.202726 systemd[1]: Started session-9.scope. Feb 9 20:59:03.268075 sshd[1988]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:03.273734 systemd[1]: sshd@9-139.178.89.23:22-139.178.89.65:54492.service: Deactivated successfully. Feb 9 20:59:03.275398 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 20:59:03.277065 systemd-logind[1456]: Session 9 logged out. Waiting for processes to exit. Feb 9 20:59:03.279315 systemd-logind[1456]: Removed session 9. Feb 9 20:59:07.056220 systemd-timesyncd[1415]: Contacted time server [2605:6400:84e1::123]:123 (2.flatcar.pool.ntp.org). Feb 9 20:59:07.056432 systemd-timesyncd[1415]: Initial clock synchronization to Fri 2024-02-09 20:59:06.703276 UTC. Feb 9 20:59:13.095941 systemd[1]: Started sshd@10-139.178.89.23:22-139.178.89.65:42892.service. Feb 9 20:59:13.129002 sshd[1994]: Accepted publickey for core from 139.178.89.65 port 42892 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:13.129917 sshd[1994]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:13.132979 systemd-logind[1456]: New session 10 of user core. Feb 9 20:59:13.133540 systemd[1]: Started session-10.scope. Feb 9 20:59:13.186464 sshd[1994]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:13.187908 systemd[1]: sshd@10-139.178.89.23:22-139.178.89.65:42892.service: Deactivated successfully. Feb 9 20:59:13.188203 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 20:59:13.188579 systemd-logind[1456]: Session 10 logged out. Waiting for processes to exit. Feb 9 20:59:13.189043 systemd[1]: Started sshd@11-139.178.89.23:22-139.178.89.65:42896.service. Feb 9 20:59:13.189375 systemd-logind[1456]: Removed session 10. Feb 9 20:59:13.222466 sshd[2000]: Accepted publickey for core from 139.178.89.65 port 42896 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:13.223387 sshd[2000]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:13.226599 systemd-logind[1456]: New session 11 of user core. Feb 9 20:59:13.227171 systemd[1]: Started session-11.scope. Feb 9 20:59:13.235093 systemd[1]: Started sshd@12-139.178.89.23:22-134.209.144.12:57450.service. Feb 9 20:59:13.278095 sshd[2000]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:13.280063 systemd[1]: sshd@11-139.178.89.23:22-139.178.89.65:42896.service: Deactivated successfully. Feb 9 20:59:13.280746 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 20:59:13.281332 systemd-logind[1456]: Session 11 logged out. Waiting for processes to exit. Feb 9 20:59:13.282238 systemd-logind[1456]: Removed session 11. Feb 9 20:59:14.587415 sshd[2004]: Invalid user miguelght from 134.209.144.12 port 57450 Feb 9 20:59:14.593313 sshd[2004]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:14.594401 sshd[2004]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:59:14.594484 sshd[2004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.144.12 Feb 9 20:59:14.595345 sshd[2004]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:16.694389 systemd[1]: Started sshd@13-139.178.89.23:22-121.11.103.144:59398.service. Feb 9 20:59:16.950092 sshd[2004]: Failed password for invalid user miguelght from 134.209.144.12 port 57450 ssh2 Feb 9 20:59:17.603553 sshd[2009]: Invalid user moali from 121.11.103.144 port 59398 Feb 9 20:59:17.609756 sshd[2009]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:17.610754 sshd[2009]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:59:17.610839 sshd[2009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.103.144 Feb 9 20:59:17.611699 sshd[2009]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:17.974935 sshd[2004]: Received disconnect from 134.209.144.12 port 57450:11: Bye Bye [preauth] Feb 9 20:59:17.974935 sshd[2004]: Disconnected from invalid user miguelght 134.209.144.12 port 57450 [preauth] Feb 9 20:59:17.977244 systemd[1]: sshd@12-139.178.89.23:22-134.209.144.12:57450.service: Deactivated successfully. Feb 9 20:59:19.379189 sshd[2009]: Failed password for invalid user moali from 121.11.103.144 port 59398 ssh2 Feb 9 20:59:19.895087 sshd[2009]: Received disconnect from 121.11.103.144 port 59398:11: Bye Bye [preauth] Feb 9 20:59:19.895087 sshd[2009]: Disconnected from invalid user moali 121.11.103.144 port 59398 [preauth] Feb 9 20:59:19.897637 systemd[1]: sshd@13-139.178.89.23:22-121.11.103.144:59398.service: Deactivated successfully. Feb 9 20:59:20.396006 update_engine[1458]: I0209 20:59:20.395890 1458 update_attempter.cc:509] Updating boot flags... Feb 9 20:59:21.021284 systemd[1]: Started sshd@14-139.178.89.23:22-192.241.153.100:46500.service. Feb 9 20:59:21.439859 sshd[2033]: Invalid user nieyulong from 192.241.153.100 port 46500 Feb 9 20:59:21.446190 sshd[2033]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:21.447204 sshd[2033]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:59:21.447290 sshd[2033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 20:59:21.448217 sshd[2033]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:23.100917 systemd[1]: Started sshd@15-139.178.89.23:22-101.43.121.33:56784.service. Feb 9 20:59:23.154122 systemd[1]: Started sshd@16-139.178.89.23:22-139.178.89.65:40898.service. Feb 9 20:59:23.190518 sshd[2039]: Accepted publickey for core from 139.178.89.65 port 40898 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:23.191267 sshd[2039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:23.193775 systemd-logind[1456]: New session 12 of user core. Feb 9 20:59:23.194409 systemd[1]: Started session-12.scope. Feb 9 20:59:23.247166 sshd[2039]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:23.248707 systemd[1]: sshd@16-139.178.89.23:22-139.178.89.65:40898.service: Deactivated successfully. Feb 9 20:59:23.249025 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 20:59:23.249307 systemd-logind[1456]: Session 12 logged out. Waiting for processes to exit. Feb 9 20:59:23.249926 systemd[1]: Started sshd@17-139.178.89.23:22-139.178.89.65:40900.service. Feb 9 20:59:23.250284 systemd-logind[1456]: Removed session 12. Feb 9 20:59:23.283389 sshd[2045]: Accepted publickey for core from 139.178.89.65 port 40900 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:23.284284 sshd[2045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:23.287278 systemd-logind[1456]: New session 13 of user core. Feb 9 20:59:23.288149 systemd[1]: Started session-13.scope. Feb 9 20:59:23.352209 sshd[2045]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:23.357839 systemd[1]: sshd@17-139.178.89.23:22-139.178.89.65:40900.service: Deactivated successfully. Feb 9 20:59:23.359560 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 20:59:23.361272 systemd-logind[1456]: Session 13 logged out. Waiting for processes to exit. Feb 9 20:59:23.363510 systemd-logind[1456]: Removed session 13. Feb 9 20:59:23.944085 sshd[2036]: Invalid user darunetmaman from 101.43.121.33 port 56784 Feb 9 20:59:23.950087 sshd[2036]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:23.951125 sshd[2036]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:59:23.951212 sshd[2036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 20:59:23.952121 sshd[2036]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:24.098078 sshd[2033]: Failed password for invalid user nieyulong from 192.241.153.100 port 46500 ssh2 Feb 9 20:59:25.621589 sshd[2033]: Received disconnect from 192.241.153.100 port 46500:11: Bye Bye [preauth] Feb 9 20:59:25.621589 sshd[2033]: Disconnected from invalid user nieyulong 192.241.153.100 port 46500 [preauth] Feb 9 20:59:25.624017 systemd[1]: sshd@14-139.178.89.23:22-192.241.153.100:46500.service: Deactivated successfully. Feb 9 20:59:25.874373 sshd[2036]: Failed password for invalid user darunetmaman from 101.43.121.33 port 56784 ssh2 Feb 9 20:59:27.182251 sshd[2036]: Received disconnect from 101.43.121.33 port 56784:11: Bye Bye [preauth] Feb 9 20:59:27.182251 sshd[2036]: Disconnected from invalid user darunetmaman 101.43.121.33 port 56784 [preauth] Feb 9 20:59:27.185043 systemd[1]: sshd@15-139.178.89.23:22-101.43.121.33:56784.service: Deactivated successfully. Feb 9 20:59:33.326722 systemd[1]: Started sshd@18-139.178.89.23:22-139.178.89.65:45470.service. Feb 9 20:59:33.359845 sshd[2053]: Accepted publickey for core from 139.178.89.65 port 45470 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:33.360756 sshd[2053]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:33.363847 systemd-logind[1456]: New session 14 of user core. Feb 9 20:59:33.364420 systemd[1]: Started session-14.scope. Feb 9 20:59:33.417973 sshd[2053]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:33.419489 systemd[1]: sshd@18-139.178.89.23:22-139.178.89.65:45470.service: Deactivated successfully. Feb 9 20:59:33.419790 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 20:59:33.420079 systemd-logind[1456]: Session 14 logged out. Waiting for processes to exit. Feb 9 20:59:33.420589 systemd[1]: Started sshd@19-139.178.89.23:22-139.178.89.65:45474.service. Feb 9 20:59:33.420968 systemd-logind[1456]: Removed session 14. Feb 9 20:59:33.454215 sshd[2059]: Accepted publickey for core from 139.178.89.65 port 45474 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:33.454861 sshd[2059]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:33.457224 systemd-logind[1456]: New session 15 of user core. Feb 9 20:59:33.457676 systemd[1]: Started session-15.scope. Feb 9 20:59:33.509880 sshd[2059]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:33.512955 systemd[1]: sshd@19-139.178.89.23:22-139.178.89.65:45474.service: Deactivated successfully. Feb 9 20:59:33.513939 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 20:59:33.514927 systemd-logind[1456]: Session 15 logged out. Waiting for processes to exit. Feb 9 20:59:33.516382 systemd-logind[1456]: Removed session 15. Feb 9 20:59:35.097824 systemd[1]: Started sshd@20-139.178.89.23:22-43.153.207.95:45528.service. Feb 9 20:59:36.170803 sshd[2066]: Invalid user afgha from 43.153.207.95 port 45528 Feb 9 20:59:36.176784 sshd[2066]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:36.177762 sshd[2066]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:59:36.177850 sshd[2066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.207.95 Feb 9 20:59:36.178739 sshd[2066]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:38.553655 sshd[2066]: Failed password for invalid user afgha from 43.153.207.95 port 45528 ssh2 Feb 9 20:59:39.853177 sshd[2066]: Received disconnect from 43.153.207.95 port 45528:11: Bye Bye [preauth] Feb 9 20:59:39.853177 sshd[2066]: Disconnected from invalid user afgha 43.153.207.95 port 45528 [preauth] Feb 9 20:59:39.855757 systemd[1]: sshd@20-139.178.89.23:22-43.153.207.95:45528.service: Deactivated successfully. Feb 9 20:59:40.120145 systemd[1]: Started sshd@21-139.178.89.23:22-103.237.87.215:34986.service. Feb 9 20:59:41.269646 sshd[2070]: Invalid user darunetmaman from 103.237.87.215 port 34986 Feb 9 20:59:41.276134 sshd[2070]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:41.277131 sshd[2070]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:59:41.277217 sshd[2070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.237.87.215 Feb 9 20:59:41.278117 sshd[2070]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:42.674288 sshd[2070]: Failed password for invalid user darunetmaman from 103.237.87.215 port 34986 ssh2 Feb 9 20:59:43.022731 sshd[2070]: Received disconnect from 103.237.87.215 port 34986:11: Bye Bye [preauth] Feb 9 20:59:43.022731 sshd[2070]: Disconnected from invalid user darunetmaman 103.237.87.215 port 34986 [preauth] Feb 9 20:59:43.025427 systemd[1]: sshd@21-139.178.89.23:22-103.237.87.215:34986.service: Deactivated successfully. Feb 9 20:59:43.486346 systemd[1]: Started sshd@22-139.178.89.23:22-175.139.200.245:40141.service. Feb 9 20:59:43.506116 systemd[1]: Started sshd@23-139.178.89.23:22-139.178.89.65:54732.service. Feb 9 20:59:43.540034 sshd[2077]: Accepted publickey for core from 139.178.89.65 port 54732 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:43.540841 sshd[2077]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:43.543548 systemd-logind[1456]: New session 16 of user core. Feb 9 20:59:43.544169 systemd[1]: Started session-16.scope. Feb 9 20:59:43.597784 sshd[2077]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:43.599200 systemd[1]: sshd@23-139.178.89.23:22-139.178.89.65:54732.service: Deactivated successfully. Feb 9 20:59:43.599571 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 20:59:43.599935 systemd-logind[1456]: Session 16 logged out. Waiting for processes to exit. Feb 9 20:59:43.600410 systemd[1]: Started sshd@24-139.178.89.23:22-139.178.89.65:54748.service. Feb 9 20:59:43.600863 systemd-logind[1456]: Removed session 16. Feb 9 20:59:43.633919 sshd[2083]: Accepted publickey for core from 139.178.89.65 port 54748 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:43.634811 sshd[2083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:43.638058 systemd-logind[1456]: New session 17 of user core. Feb 9 20:59:43.638702 systemd[1]: Started session-17.scope. Feb 9 20:59:43.703436 sshd[2083]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:43.709150 systemd[1]: sshd@24-139.178.89.23:22-139.178.89.65:54748.service: Deactivated successfully. Feb 9 20:59:43.710884 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 20:59:43.712563 systemd-logind[1456]: Session 17 logged out. Waiting for processes to exit. Feb 9 20:59:43.714892 systemd-logind[1456]: Removed session 17. Feb 9 20:59:44.661876 sshd[2074]: Invalid user ayasalmahdi from 175.139.200.245 port 40141 Feb 9 20:59:44.668141 sshd[2074]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:44.669174 sshd[2074]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:59:44.669261 sshd[2074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.200.245 Feb 9 20:59:44.670202 sshd[2074]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:47.145024 sshd[2074]: Failed password for invalid user ayasalmahdi from 175.139.200.245 port 40141 ssh2 Feb 9 20:59:47.443514 sshd[2074]: Received disconnect from 175.139.200.245 port 40141:11: Bye Bye [preauth] Feb 9 20:59:47.443514 sshd[2074]: Disconnected from invalid user ayasalmahdi 175.139.200.245 port 40141 [preauth] Feb 9 20:59:47.445942 systemd[1]: sshd@22-139.178.89.23:22-175.139.200.245:40141.service: Deactivated successfully. Feb 9 20:59:53.714015 systemd[1]: Started sshd@25-139.178.89.23:22-139.178.89.65:51416.service. Feb 9 20:59:53.747075 sshd[2090]: Accepted publickey for core from 139.178.89.65 port 51416 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:53.747958 sshd[2090]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:53.751077 systemd-logind[1456]: New session 18 of user core. Feb 9 20:59:53.751663 systemd[1]: Started session-18.scope. Feb 9 20:59:53.805522 sshd[2090]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:53.807073 systemd[1]: sshd@25-139.178.89.23:22-139.178.89.65:51416.service: Deactivated successfully. Feb 9 20:59:53.807384 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 20:59:53.807789 systemd-logind[1456]: Session 18 logged out. Waiting for processes to exit. Feb 9 20:59:53.808243 systemd[1]: Started sshd@26-139.178.89.23:22-139.178.89.65:51428.service. Feb 9 20:59:53.808708 systemd-logind[1456]: Removed session 18. Feb 9 20:59:53.842446 sshd[2096]: Accepted publickey for core from 139.178.89.65 port 51428 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 20:59:53.843373 sshd[2096]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 20:59:53.846475 systemd-logind[1456]: New session 19 of user core. Feb 9 20:59:53.847146 systemd[1]: Started session-19.scope. Feb 9 20:59:53.912128 sshd[2096]: pam_unix(sshd:session): session closed for user core Feb 9 20:59:53.917834 systemd[1]: sshd@26-139.178.89.23:22-139.178.89.65:51428.service: Deactivated successfully. Feb 9 20:59:53.919560 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 20:59:53.921262 systemd-logind[1456]: Session 19 logged out. Waiting for processes to exit. Feb 9 20:59:53.923520 systemd-logind[1456]: Removed session 19. Feb 9 20:59:57.026580 systemd[1]: Started sshd@27-139.178.89.23:22-124.222.159.25:50996.service. Feb 9 20:59:57.671251 systemd[1]: Started sshd@28-139.178.89.23:22-101.43.121.33:37392.service. Feb 9 20:59:57.869008 sshd[2102]: Invalid user dbseolbi from 124.222.159.25 port 50996 Feb 9 20:59:57.875202 sshd[2102]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:57.876186 sshd[2102]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:59:57.876273 sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.159.25 Feb 9 20:59:57.877197 sshd[2102]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:58.529799 sshd[2105]: Invalid user caoyihan from 101.43.121.33 port 37392 Feb 9 20:59:58.535814 sshd[2105]: pam_faillock(sshd:auth): User unknown Feb 9 20:59:58.536907 sshd[2105]: pam_unix(sshd:auth): check pass; user unknown Feb 9 20:59:58.536994 sshd[2105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 20:59:58.538003 sshd[2105]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:00.136495 sshd[2102]: Failed password for invalid user dbseolbi from 124.222.159.25 port 50996 ssh2 Feb 9 21:00:00.265677 sshd[2105]: Failed password for invalid user caoyihan from 101.43.121.33 port 37392 ssh2 Feb 9 21:00:00.637551 sshd[2105]: Received disconnect from 101.43.121.33 port 37392:11: Bye Bye [preauth] Feb 9 21:00:00.637551 sshd[2105]: Disconnected from invalid user caoyihan 101.43.121.33 port 37392 [preauth] Feb 9 21:00:00.640099 systemd[1]: sshd@28-139.178.89.23:22-101.43.121.33:37392.service: Deactivated successfully. Feb 9 21:00:01.441389 sshd[2102]: Received disconnect from 124.222.159.25 port 50996:11: Bye Bye [preauth] Feb 9 21:00:01.441389 sshd[2102]: Disconnected from invalid user dbseolbi 124.222.159.25 port 50996 [preauth] Feb 9 21:00:01.443958 systemd[1]: sshd@27-139.178.89.23:22-124.222.159.25:50996.service: Deactivated successfully. Feb 9 21:00:03.921842 systemd[1]: Started sshd@29-139.178.89.23:22-139.178.89.65:44532.service. Feb 9 21:00:03.954832 sshd[2110]: Accepted publickey for core from 139.178.89.65 port 44532 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:03.955701 sshd[2110]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:03.958717 systemd-logind[1456]: New session 20 of user core. Feb 9 21:00:03.959345 systemd[1]: Started session-20.scope. Feb 9 21:00:04.012666 sshd[2110]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:04.014283 systemd[1]: sshd@29-139.178.89.23:22-139.178.89.65:44532.service: Deactivated successfully. Feb 9 21:00:04.014585 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 21:00:04.014905 systemd-logind[1456]: Session 20 logged out. Waiting for processes to exit. Feb 9 21:00:04.015399 systemd[1]: Started sshd@30-139.178.89.23:22-139.178.89.65:44534.service. Feb 9 21:00:04.015906 systemd-logind[1456]: Removed session 20. Feb 9 21:00:04.048760 sshd[2116]: Accepted publickey for core from 139.178.89.65 port 44534 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:04.049445 sshd[2116]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:04.051794 systemd-logind[1456]: New session 21 of user core. Feb 9 21:00:04.052203 systemd[1]: Started session-21.scope. Feb 9 21:00:04.104569 sshd[2116]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:04.107538 systemd[1]: sshd@30-139.178.89.23:22-139.178.89.65:44534.service: Deactivated successfully. Feb 9 21:00:04.108514 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 21:00:04.109578 systemd-logind[1456]: Session 21 logged out. Waiting for processes to exit. Feb 9 21:00:04.111211 systemd-logind[1456]: Removed session 21. Feb 9 21:00:06.455080 systemd[1]: Started sshd@31-139.178.89.23:22-2.57.122.87:56476.service. Feb 9 21:00:07.174390 sshd[2122]: Invalid user fjiang from 2.57.122.87 port 56476 Feb 9 21:00:07.356466 sshd[2122]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:07.357463 sshd[2122]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:00:07.357549 sshd[2122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 9 21:00:07.358462 sshd[2122]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:09.657824 sshd[2122]: Failed password for invalid user fjiang from 2.57.122.87 port 56476 ssh2 Feb 9 21:00:11.053728 sshd[2122]: Connection closed by invalid user fjiang 2.57.122.87 port 56476 [preauth] Feb 9 21:00:11.056243 systemd[1]: sshd@31-139.178.89.23:22-2.57.122.87:56476.service: Deactivated successfully. Feb 9 21:00:13.804691 systemd[1]: Started sshd@32-139.178.89.23:22-134.209.144.12:47578.service. Feb 9 21:00:14.115557 systemd[1]: Started sshd@33-139.178.89.23:22-139.178.89.65:53458.service. Feb 9 21:00:14.151888 sshd[2129]: Accepted publickey for core from 139.178.89.65 port 53458 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:14.152589 sshd[2129]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:14.155010 systemd-logind[1456]: New session 22 of user core. Feb 9 21:00:14.155532 systemd[1]: Started session-22.scope. Feb 9 21:00:14.207888 sshd[2129]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:14.209343 systemd[1]: sshd@33-139.178.89.23:22-139.178.89.65:53458.service: Deactivated successfully. Feb 9 21:00:14.209704 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 21:00:14.210071 systemd-logind[1456]: Session 22 logged out. Waiting for processes to exit. Feb 9 21:00:14.210574 systemd[1]: Started sshd@34-139.178.89.23:22-139.178.89.65:53464.service. Feb 9 21:00:14.210972 systemd-logind[1456]: Removed session 22. Feb 9 21:00:14.243844 sshd[2137]: Accepted publickey for core from 139.178.89.65 port 53464 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:14.244594 sshd[2137]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:14.247354 systemd-logind[1456]: New session 23 of user core. Feb 9 21:00:14.247856 systemd[1]: Started session-23.scope. Feb 9 21:00:14.309375 sshd[2137]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:14.314597 systemd[1]: sshd@34-139.178.89.23:22-139.178.89.65:53464.service: Deactivated successfully. Feb 9 21:00:14.316130 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 21:00:14.317602 systemd-logind[1456]: Session 23 logged out. Waiting for processes to exit. Feb 9 21:00:14.319784 systemd-logind[1456]: Removed session 23. Feb 9 21:00:14.653548 systemd[1]: Started sshd@35-139.178.89.23:22-42.51.37.190:49218.service. Feb 9 21:00:15.200380 sshd[2126]: Invalid user yasami from 134.209.144.12 port 47578 Feb 9 21:00:15.206516 sshd[2126]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:15.207678 sshd[2126]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:00:15.207767 sshd[2126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.144.12 Feb 9 21:00:15.208798 sshd[2126]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:15.470325 systemd[1]: Started sshd@36-139.178.89.23:22-192.241.153.100:58122.service. Feb 9 21:00:15.683149 sshd[2144]: Invalid user dseng from 42.51.37.190 port 49218 Feb 9 21:00:15.684764 sshd[2144]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:15.685023 sshd[2144]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:00:15.685045 sshd[2144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.37.190 Feb 9 21:00:15.685271 sshd[2144]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:15.896892 sshd[2147]: Invalid user roza from 192.241.153.100 port 58122 Feb 9 21:00:15.903196 sshd[2147]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:15.904290 sshd[2147]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:00:15.904409 sshd[2147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 21:00:15.905457 sshd[2147]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:17.141775 systemd[1]: Started sshd@37-139.178.89.23:22-121.11.103.144:49498.service. Feb 9 21:00:17.272316 sshd[2126]: Failed password for invalid user yasami from 134.209.144.12 port 47578 ssh2 Feb 9 21:00:17.748732 sshd[2144]: Failed password for invalid user dseng from 42.51.37.190 port 49218 ssh2 Feb 9 21:00:17.969064 sshd[2147]: Failed password for invalid user roza from 192.241.153.100 port 58122 ssh2 Feb 9 21:00:18.084862 sshd[2150]: Invalid user samrat from 121.11.103.144 port 49498 Feb 9 21:00:18.086050 sshd[2150]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:18.086253 sshd[2150]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:00:18.086269 sshd[2150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.103.144 Feb 9 21:00:18.086442 sshd[2150]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:18.290606 sshd[2147]: Received disconnect from 192.241.153.100 port 58122:11: Bye Bye [preauth] Feb 9 21:00:18.290606 sshd[2147]: Disconnected from invalid user roza 192.241.153.100 port 58122 [preauth] Feb 9 21:00:18.293107 systemd[1]: sshd@36-139.178.89.23:22-192.241.153.100:58122.service: Deactivated successfully. Feb 9 21:00:19.184227 sshd[2126]: Received disconnect from 134.209.144.12 port 47578:11: Bye Bye [preauth] Feb 9 21:00:19.184227 sshd[2126]: Disconnected from invalid user yasami 134.209.144.12 port 47578 [preauth] Feb 9 21:00:19.186802 systemd[1]: sshd@32-139.178.89.23:22-134.209.144.12:47578.service: Deactivated successfully. Feb 9 21:00:19.819870 sshd[2144]: Received disconnect from 42.51.37.190 port 49218:11: Bye Bye [preauth] Feb 9 21:00:19.819870 sshd[2144]: Disconnected from invalid user dseng 42.51.37.190 port 49218 [preauth] Feb 9 21:00:19.822323 systemd[1]: sshd@35-139.178.89.23:22-42.51.37.190:49218.service: Deactivated successfully. Feb 9 21:00:20.561457 sshd[2150]: Failed password for invalid user samrat from 121.11.103.144 port 49498 ssh2 Feb 9 21:00:22.563814 sshd[2150]: Received disconnect from 121.11.103.144 port 49498:11: Bye Bye [preauth] Feb 9 21:00:22.563814 sshd[2150]: Disconnected from invalid user samrat 121.11.103.144 port 49498 [preauth] Feb 9 21:00:22.566346 systemd[1]: sshd@37-139.178.89.23:22-121.11.103.144:49498.service: Deactivated successfully. Feb 9 21:00:24.317854 systemd[1]: Started sshd@38-139.178.89.23:22-139.178.89.65:33236.service. Feb 9 21:00:24.350519 sshd[2157]: Accepted publickey for core from 139.178.89.65 port 33236 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:24.351332 sshd[2157]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:24.354084 systemd-logind[1456]: New session 24 of user core. Feb 9 21:00:24.354655 systemd[1]: Started session-24.scope. Feb 9 21:00:24.408443 sshd[2157]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:24.409956 systemd[1]: sshd@38-139.178.89.23:22-139.178.89.65:33236.service: Deactivated successfully. Feb 9 21:00:24.410244 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 21:00:24.410666 systemd-logind[1456]: Session 24 logged out. Waiting for processes to exit. Feb 9 21:00:24.411123 systemd[1]: Started sshd@39-139.178.89.23:22-139.178.89.65:33244.service. Feb 9 21:00:24.411543 systemd-logind[1456]: Removed session 24. Feb 9 21:00:24.444496 sshd[2163]: Accepted publickey for core from 139.178.89.65 port 33244 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:24.445303 sshd[2163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:24.448070 systemd-logind[1456]: New session 25 of user core. Feb 9 21:00:24.448568 systemd[1]: Started session-25.scope. Feb 9 21:00:24.503161 sshd[2163]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:24.504446 systemd[1]: sshd@39-139.178.89.23:22-139.178.89.65:33244.service: Deactivated successfully. Feb 9 21:00:24.504840 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 21:00:24.505211 systemd-logind[1456]: Session 25 logged out. Waiting for processes to exit. Feb 9 21:00:24.505870 systemd-logind[1456]: Removed session 25. Feb 9 21:00:29.912751 systemd[1]: Started sshd@40-139.178.89.23:22-101.43.121.33:46206.service. Feb 9 21:00:30.856733 sshd[2169]: Invalid user junpeng from 101.43.121.33 port 46206 Feb 9 21:00:30.862816 sshd[2169]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:30.863902 sshd[2169]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:00:30.863990 sshd[2169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:00:30.865037 sshd[2169]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:33.320026 sshd[2169]: Failed password for invalid user junpeng from 101.43.121.33 port 46206 ssh2 Feb 9 21:00:34.512854 systemd[1]: Started sshd@41-139.178.89.23:22-139.178.89.65:57810.service. Feb 9 21:00:34.545561 sshd[2172]: Accepted publickey for core from 139.178.89.65 port 57810 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:34.546421 sshd[2172]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:34.549322 systemd-logind[1456]: New session 26 of user core. Feb 9 21:00:34.549945 systemd[1]: Started session-26.scope. Feb 9 21:00:34.603928 sshd[2172]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:34.605397 systemd[1]: sshd@41-139.178.89.23:22-139.178.89.65:57810.service: Deactivated successfully. Feb 9 21:00:34.605706 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 21:00:34.606004 systemd-logind[1456]: Session 26 logged out. Waiting for processes to exit. Feb 9 21:00:34.606537 systemd[1]: Started sshd@42-139.178.89.23:22-139.178.89.65:57826.service. Feb 9 21:00:34.607033 systemd-logind[1456]: Removed session 26. Feb 9 21:00:34.640290 sshd[2178]: Accepted publickey for core from 139.178.89.65 port 57826 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:34.641147 sshd[2178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:34.644034 systemd-logind[1456]: New session 27 of user core. Feb 9 21:00:34.644598 systemd[1]: Started session-27.scope. Feb 9 21:00:34.698618 sshd[2178]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:34.699916 systemd[1]: sshd@42-139.178.89.23:22-139.178.89.65:57826.service: Deactivated successfully. Feb 9 21:00:34.700322 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 21:00:34.700698 systemd-logind[1456]: Session 27 logged out. Waiting for processes to exit. Feb 9 21:00:34.701248 systemd-logind[1456]: Removed session 27. Feb 9 21:00:35.654023 sshd[2169]: Received disconnect from 101.43.121.33 port 46206:11: Bye Bye [preauth] Feb 9 21:00:35.654023 sshd[2169]: Disconnected from invalid user junpeng 101.43.121.33 port 46206 [preauth] Feb 9 21:00:35.656664 systemd[1]: sshd@40-139.178.89.23:22-101.43.121.33:46206.service: Deactivated successfully. Feb 9 21:00:38.537968 systemd[1]: Started sshd@43-139.178.89.23:22-43.153.207.95:45382.service. Feb 9 21:00:39.624049 sshd[2187]: Invalid user conic from 43.153.207.95 port 45382 Feb 9 21:00:39.630425 sshd[2187]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:39.631398 sshd[2187]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:00:39.631487 sshd[2187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.207.95 Feb 9 21:00:39.632400 sshd[2187]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:41.656025 sshd[2187]: Failed password for invalid user conic from 43.153.207.95 port 45382 ssh2 Feb 9 21:00:42.512792 sshd[2187]: Received disconnect from 43.153.207.95 port 45382:11: Bye Bye [preauth] Feb 9 21:00:42.512792 sshd[2187]: Disconnected from invalid user conic 43.153.207.95 port 45382 [preauth] Feb 9 21:00:42.515293 systemd[1]: sshd@43-139.178.89.23:22-43.153.207.95:45382.service: Deactivated successfully. Feb 9 21:00:44.707973 systemd[1]: Started sshd@44-139.178.89.23:22-139.178.89.65:52242.service. Feb 9 21:00:44.741288 sshd[2191]: Accepted publickey for core from 139.178.89.65 port 52242 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:44.742028 sshd[2191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:44.744750 systemd-logind[1456]: New session 28 of user core. Feb 9 21:00:44.745161 systemd[1]: Started session-28.scope. Feb 9 21:00:44.795840 sshd[2191]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:44.797395 systemd[1]: sshd@44-139.178.89.23:22-139.178.89.65:52242.service: Deactivated successfully. Feb 9 21:00:44.797702 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 21:00:44.798053 systemd-logind[1456]: Session 28 logged out. Waiting for processes to exit. Feb 9 21:00:44.798560 systemd[1]: Started sshd@45-139.178.89.23:22-139.178.89.65:52252.service. Feb 9 21:00:44.798982 systemd-logind[1456]: Removed session 28. Feb 9 21:00:44.831873 sshd[2197]: Accepted publickey for core from 139.178.89.65 port 52252 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:44.832701 sshd[2197]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:44.835657 systemd-logind[1456]: New session 29 of user core. Feb 9 21:00:44.836195 systemd[1]: Started session-29.scope. Feb 9 21:00:44.889639 sshd[2197]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:44.890886 systemd[1]: sshd@45-139.178.89.23:22-139.178.89.65:52252.service: Deactivated successfully. Feb 9 21:00:44.891255 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 21:00:44.891624 systemd-logind[1456]: Session 29 logged out. Waiting for processes to exit. Feb 9 21:00:44.892141 systemd-logind[1456]: Removed session 29. Feb 9 21:00:45.821578 systemd[1]: Started sshd@46-139.178.89.23:22-103.237.87.215:54264.service. Feb 9 21:00:46.969851 sshd[2203]: Invalid user okbangsu from 103.237.87.215 port 54264 Feb 9 21:00:46.976280 sshd[2203]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:46.977322 sshd[2203]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:00:46.977430 sshd[2203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.237.87.215 Feb 9 21:00:46.978408 sshd[2203]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:48.403994 systemd[1]: Started sshd@47-139.178.89.23:22-175.139.200.245:51184.service. Feb 9 21:00:49.297768 sshd[2203]: Failed password for invalid user okbangsu from 103.237.87.215 port 54264 ssh2 Feb 9 21:00:49.572461 sshd[2206]: Invalid user aclass from 175.139.200.245 port 51184 Feb 9 21:00:49.578415 sshd[2206]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:49.579409 sshd[2206]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:00:49.579494 sshd[2206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.200.245 Feb 9 21:00:49.580415 sshd[2206]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:49.846511 systemd[1]: Started sshd@48-139.178.89.23:22-124.222.159.25:38030.service. Feb 9 21:00:50.266579 sshd[2203]: Received disconnect from 103.237.87.215 port 54264:11: Bye Bye [preauth] Feb 9 21:00:50.266579 sshd[2203]: Disconnected from invalid user okbangsu 103.237.87.215 port 54264 [preauth] Feb 9 21:00:50.268646 systemd[1]: sshd@46-139.178.89.23:22-103.237.87.215:54264.service: Deactivated successfully. Feb 9 21:00:50.651060 sshd[2212]: Invalid user hansol from 124.222.159.25 port 38030 Feb 9 21:00:50.657199 sshd[2212]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:50.658225 sshd[2212]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:00:50.658311 sshd[2212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.159.25 Feb 9 21:00:50.659292 sshd[2212]: pam_faillock(sshd:auth): User unknown Feb 9 21:00:51.644142 sshd[2206]: Failed password for invalid user aclass from 175.139.200.245 port 51184 ssh2 Feb 9 21:00:52.527115 sshd[2212]: Failed password for invalid user hansol from 124.222.159.25 port 38030 ssh2 Feb 9 21:00:53.167575 sshd[2206]: Received disconnect from 175.139.200.245 port 51184:11: Bye Bye [preauth] Feb 9 21:00:53.167575 sshd[2206]: Disconnected from invalid user aclass 175.139.200.245 port 51184 [preauth] Feb 9 21:00:53.170046 systemd[1]: sshd@47-139.178.89.23:22-175.139.200.245:51184.service: Deactivated successfully. Feb 9 21:00:53.837092 sshd[2212]: Received disconnect from 124.222.159.25 port 38030:11: Bye Bye [preauth] Feb 9 21:00:53.837092 sshd[2212]: Disconnected from invalid user hansol 124.222.159.25 port 38030 [preauth] Feb 9 21:00:53.839726 systemd[1]: sshd@48-139.178.89.23:22-124.222.159.25:38030.service: Deactivated successfully. Feb 9 21:00:54.899355 systemd[1]: Started sshd@49-139.178.89.23:22-139.178.89.65:49208.service. Feb 9 21:00:54.932510 sshd[2218]: Accepted publickey for core from 139.178.89.65 port 49208 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:54.933385 sshd[2218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:54.936343 systemd-logind[1456]: New session 30 of user core. Feb 9 21:00:54.936998 systemd[1]: Started session-30.scope. Feb 9 21:00:54.990916 sshd[2218]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:54.992475 systemd[1]: sshd@49-139.178.89.23:22-139.178.89.65:49208.service: Deactivated successfully. Feb 9 21:00:54.992861 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 21:00:54.993159 systemd-logind[1456]: Session 30 logged out. Waiting for processes to exit. Feb 9 21:00:54.993699 systemd[1]: Started sshd@50-139.178.89.23:22-139.178.89.65:49220.service. Feb 9 21:00:54.994133 systemd-logind[1456]: Removed session 30. Feb 9 21:00:55.027098 sshd[2224]: Accepted publickey for core from 139.178.89.65 port 49220 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:00:55.028014 sshd[2224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:00:55.031069 systemd-logind[1456]: New session 31 of user core. Feb 9 21:00:55.031692 systemd[1]: Started session-31.scope. Feb 9 21:00:55.085902 sshd[2224]: pam_unix(sshd:session): session closed for user core Feb 9 21:00:55.087073 systemd[1]: sshd@50-139.178.89.23:22-139.178.89.65:49220.service: Deactivated successfully. Feb 9 21:00:55.087462 systemd[1]: session-31.scope: Deactivated successfully. Feb 9 21:00:55.087903 systemd-logind[1456]: Session 31 logged out. Waiting for processes to exit. Feb 9 21:00:55.088338 systemd-logind[1456]: Removed session 31. Feb 9 21:01:02.284966 systemd[1]: Started sshd@51-139.178.89.23:22-101.43.121.33:54932.service. Feb 9 21:01:03.174136 sshd[2232]: Invalid user majidmsn from 101.43.121.33 port 54932 Feb 9 21:01:03.180233 sshd[2232]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:03.181276 sshd[2232]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:01:03.181391 sshd[2232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:01:03.182264 sshd[2232]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:04.834548 sshd[2232]: Failed password for invalid user majidmsn from 101.43.121.33 port 54932 ssh2 Feb 9 21:01:05.096020 systemd[1]: Started sshd@52-139.178.89.23:22-139.178.89.65:36484.service. Feb 9 21:01:05.129552 sshd[2235]: Accepted publickey for core from 139.178.89.65 port 36484 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:05.130254 sshd[2235]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:05.132670 systemd-logind[1456]: New session 32 of user core. Feb 9 21:01:05.133145 systemd[1]: Started session-32.scope. Feb 9 21:01:05.183868 sshd[2235]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:05.185339 systemd[1]: sshd@52-139.178.89.23:22-139.178.89.65:36484.service: Deactivated successfully. Feb 9 21:01:05.185667 systemd[1]: session-32.scope: Deactivated successfully. Feb 9 21:01:05.186019 systemd-logind[1456]: Session 32 logged out. Waiting for processes to exit. Feb 9 21:01:05.186539 systemd[1]: Started sshd@53-139.178.89.23:22-139.178.89.65:36496.service. Feb 9 21:01:05.187028 systemd-logind[1456]: Removed session 32. Feb 9 21:01:05.220218 sshd[2241]: Accepted publickey for core from 139.178.89.65 port 36496 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:05.221107 sshd[2241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:05.223972 systemd-logind[1456]: New session 33 of user core. Feb 9 21:01:05.224505 systemd[1]: Started session-33.scope. Feb 9 21:01:05.277431 sshd[2241]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:05.278602 systemd[1]: sshd@53-139.178.89.23:22-139.178.89.65:36496.service: Deactivated successfully. Feb 9 21:01:05.278979 systemd[1]: session-33.scope: Deactivated successfully. Feb 9 21:01:05.279282 systemd-logind[1456]: Session 33 logged out. Waiting for processes to exit. Feb 9 21:01:05.279796 systemd-logind[1456]: Removed session 33. Feb 9 21:01:06.021194 sshd[2232]: Received disconnect from 101.43.121.33 port 54932:11: Bye Bye [preauth] Feb 9 21:01:06.021194 sshd[2232]: Disconnected from invalid user majidmsn 101.43.121.33 port 54932 [preauth] Feb 9 21:01:06.023787 systemd[1]: sshd@51-139.178.89.23:22-101.43.121.33:54932.service: Deactivated successfully. Feb 9 21:01:09.636549 systemd[1]: Started sshd@54-139.178.89.23:22-192.241.153.100:59352.service. Feb 9 21:01:10.064148 sshd[2248]: Invalid user insane from 192.241.153.100 port 59352 Feb 9 21:01:10.070438 sshd[2248]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:10.071433 sshd[2248]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:01:10.071519 sshd[2248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 21:01:10.072444 sshd[2248]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:12.020546 sshd[2248]: Failed password for invalid user insane from 192.241.153.100 port 59352 ssh2 Feb 9 21:01:12.944685 sshd[2248]: Received disconnect from 192.241.153.100 port 59352:11: Bye Bye [preauth] Feb 9 21:01:12.944685 sshd[2248]: Disconnected from invalid user insane 192.241.153.100 port 59352 [preauth] Feb 9 21:01:12.947284 systemd[1]: sshd@54-139.178.89.23:22-192.241.153.100:59352.service: Deactivated successfully. Feb 9 21:01:13.783133 systemd[1]: Started sshd@55-139.178.89.23:22-134.209.144.12:37706.service. Feb 9 21:01:14.914074 systemd[1]: Started sshd@56-139.178.89.23:22-42.51.37.190:42060.service. Feb 9 21:01:15.155050 sshd[2252]: Invalid user hzy from 134.209.144.12 port 37706 Feb 9 21:01:15.161066 sshd[2252]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:15.162088 sshd[2252]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:01:15.162175 sshd[2252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.144.12 Feb 9 21:01:15.163095 sshd[2252]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:15.288301 systemd[1]: Started sshd@57-139.178.89.23:22-139.178.89.65:57942.service. Feb 9 21:01:15.324739 sshd[2258]: Accepted publickey for core from 139.178.89.65 port 57942 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:15.325464 sshd[2258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:15.327823 systemd-logind[1456]: New session 34 of user core. Feb 9 21:01:15.328285 systemd[1]: Started session-34.scope. Feb 9 21:01:15.380811 sshd[2258]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:15.382481 systemd[1]: sshd@57-139.178.89.23:22-139.178.89.65:57942.service: Deactivated successfully. Feb 9 21:01:15.382865 systemd[1]: session-34.scope: Deactivated successfully. Feb 9 21:01:15.383206 systemd-logind[1456]: Session 34 logged out. Waiting for processes to exit. Feb 9 21:01:15.383792 systemd[1]: Started sshd@58-139.178.89.23:22-139.178.89.65:57944.service. Feb 9 21:01:15.384269 systemd-logind[1456]: Removed session 34. Feb 9 21:01:15.417043 sshd[2264]: Accepted publickey for core from 139.178.89.65 port 57944 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:15.417904 sshd[2264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:15.420803 systemd-logind[1456]: New session 35 of user core. Feb 9 21:01:15.421717 systemd[1]: Started session-35.scope. Feb 9 21:01:15.475421 sshd[2264]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:15.476632 systemd[1]: sshd@58-139.178.89.23:22-139.178.89.65:57944.service: Deactivated successfully. Feb 9 21:01:15.477067 systemd[1]: session-35.scope: Deactivated successfully. Feb 9 21:01:15.477440 systemd-logind[1456]: Session 35 logged out. Waiting for processes to exit. Feb 9 21:01:15.477866 systemd-logind[1456]: Removed session 35. Feb 9 21:01:15.889492 sshd[2255]: Invalid user samrat from 42.51.37.190 port 42060 Feb 9 21:01:15.895506 sshd[2255]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:15.896491 sshd[2255]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:01:15.896571 sshd[2255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.37.190 Feb 9 21:01:15.897433 sshd[2255]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:17.462642 sshd[2252]: Failed password for invalid user hzy from 134.209.144.12 port 37706 ssh2 Feb 9 21:01:18.197043 sshd[2255]: Failed password for invalid user samrat from 42.51.37.190 port 42060 ssh2 Feb 9 21:01:18.387858 systemd[1]: Started sshd@59-139.178.89.23:22-121.11.103.144:39586.service. Feb 9 21:01:19.144565 sshd[2252]: Received disconnect from 134.209.144.12 port 37706:11: Bye Bye [preauth] Feb 9 21:01:19.144565 sshd[2252]: Disconnected from invalid user hzy 134.209.144.12 port 37706 [preauth] Feb 9 21:01:19.147070 systemd[1]: sshd@55-139.178.89.23:22-134.209.144.12:37706.service: Deactivated successfully. Feb 9 21:01:19.330243 sshd[2270]: Invalid user patrickli from 121.11.103.144 port 39586 Feb 9 21:01:19.336316 sshd[2270]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:19.337308 sshd[2270]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:01:19.337415 sshd[2270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.103.144 Feb 9 21:01:19.338271 sshd[2270]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:20.367924 sshd[2255]: Received disconnect from 42.51.37.190 port 42060:11: Bye Bye [preauth] Feb 9 21:01:20.367924 sshd[2255]: Disconnected from invalid user samrat 42.51.37.190 port 42060 [preauth] Feb 9 21:01:20.370383 systemd[1]: sshd@56-139.178.89.23:22-42.51.37.190:42060.service: Deactivated successfully. Feb 9 21:01:21.521989 sshd[2270]: Failed password for invalid user patrickli from 121.11.103.144 port 39586 ssh2 Feb 9 21:01:22.324585 sshd[2270]: Received disconnect from 121.11.103.144 port 39586:11: Bye Bye [preauth] Feb 9 21:01:22.324585 sshd[2270]: Disconnected from invalid user patrickli 121.11.103.144 port 39586 [preauth] Feb 9 21:01:22.327171 systemd[1]: sshd@59-139.178.89.23:22-121.11.103.144:39586.service: Deactivated successfully. Feb 9 21:01:25.485550 systemd[1]: Started sshd@60-139.178.89.23:22-139.178.89.65:38298.service. Feb 9 21:01:25.518910 sshd[2277]: Accepted publickey for core from 139.178.89.65 port 38298 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:25.519589 sshd[2277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:25.522059 systemd-logind[1456]: New session 36 of user core. Feb 9 21:01:25.522815 systemd[1]: Started session-36.scope. Feb 9 21:01:25.573961 sshd[2277]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:25.575748 systemd[1]: sshd@60-139.178.89.23:22-139.178.89.65:38298.service: Deactivated successfully. Feb 9 21:01:25.576109 systemd[1]: session-36.scope: Deactivated successfully. Feb 9 21:01:25.576505 systemd-logind[1456]: Session 36 logged out. Waiting for processes to exit. Feb 9 21:01:25.577037 systemd[1]: Started sshd@61-139.178.89.23:22-139.178.89.65:38306.service. Feb 9 21:01:25.577527 systemd-logind[1456]: Removed session 36. Feb 9 21:01:25.610891 sshd[2283]: Accepted publickey for core from 139.178.89.65 port 38306 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:25.611552 sshd[2283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:25.613836 systemd-logind[1456]: New session 37 of user core. Feb 9 21:01:25.614509 systemd[1]: Started session-37.scope. Feb 9 21:01:25.666813 sshd[2283]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:25.668030 systemd[1]: sshd@61-139.178.89.23:22-139.178.89.65:38306.service: Deactivated successfully. Feb 9 21:01:25.668476 systemd[1]: session-37.scope: Deactivated successfully. Feb 9 21:01:25.668816 systemd-logind[1456]: Session 37 logged out. Waiting for processes to exit. Feb 9 21:01:25.669285 systemd-logind[1456]: Removed session 37. Feb 9 21:01:34.335395 systemd[1]: Started sshd@62-139.178.89.23:22-101.43.121.33:35446.service. Feb 9 21:01:35.198667 sshd[2289]: Invalid user marat from 101.43.121.33 port 35446 Feb 9 21:01:35.204738 sshd[2289]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:35.205816 sshd[2289]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:01:35.205904 sshd[2289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:01:35.206797 sshd[2289]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:35.677075 systemd[1]: Started sshd@63-139.178.89.23:22-139.178.89.65:58702.service. Feb 9 21:01:35.710366 sshd[2292]: Accepted publickey for core from 139.178.89.65 port 58702 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:35.711249 sshd[2292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:35.714111 systemd-logind[1456]: New session 38 of user core. Feb 9 21:01:35.715069 systemd[1]: Started session-38.scope. Feb 9 21:01:35.770643 sshd[2292]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:35.772435 systemd[1]: sshd@63-139.178.89.23:22-139.178.89.65:58702.service: Deactivated successfully. Feb 9 21:01:35.772810 systemd[1]: session-38.scope: Deactivated successfully. Feb 9 21:01:35.773152 systemd-logind[1456]: Session 38 logged out. Waiting for processes to exit. Feb 9 21:01:35.773719 systemd[1]: Started sshd@64-139.178.89.23:22-139.178.89.65:58718.service. Feb 9 21:01:35.774195 systemd-logind[1456]: Removed session 38. Feb 9 21:01:35.807526 sshd[2298]: Accepted publickey for core from 139.178.89.65 port 58718 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:35.808383 sshd[2298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:35.811186 systemd-logind[1456]: New session 39 of user core. Feb 9 21:01:35.812091 systemd[1]: Started session-39.scope. Feb 9 21:01:35.868624 sshd[2298]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:35.869919 systemd[1]: sshd@64-139.178.89.23:22-139.178.89.65:58718.service: Deactivated successfully. Feb 9 21:01:35.870279 systemd[1]: session-39.scope: Deactivated successfully. Feb 9 21:01:35.870725 systemd-logind[1456]: Session 39 logged out. Waiting for processes to exit. Feb 9 21:01:35.871205 systemd-logind[1456]: Removed session 39. Feb 9 21:01:36.919191 sshd[2289]: Failed password for invalid user marat from 101.43.121.33 port 35446 ssh2 Feb 9 21:01:38.728077 sshd[2289]: Received disconnect from 101.43.121.33 port 35446:11: Bye Bye [preauth] Feb 9 21:01:38.728077 sshd[2289]: Disconnected from invalid user marat 101.43.121.33 port 35446 [preauth] Feb 9 21:01:38.730604 systemd[1]: sshd@62-139.178.89.23:22-101.43.121.33:35446.service: Deactivated successfully. Feb 9 21:01:42.280283 systemd[1]: Started sshd@65-139.178.89.23:22-43.153.207.95:51722.service. Feb 9 21:01:43.290441 sshd[2305]: Invalid user munback from 43.153.207.95 port 51722 Feb 9 21:01:43.296544 sshd[2305]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:43.297620 sshd[2305]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:01:43.297707 sshd[2305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.207.95 Feb 9 21:01:43.298744 sshd[2305]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:45.442715 sshd[2305]: Failed password for invalid user munback from 43.153.207.95 port 51722 ssh2 Feb 9 21:01:45.642737 sshd[2305]: Received disconnect from 43.153.207.95 port 51722:11: Bye Bye [preauth] Feb 9 21:01:45.642737 sshd[2305]: Disconnected from invalid user munback 43.153.207.95 port 51722 [preauth] Feb 9 21:01:45.645221 systemd[1]: sshd@65-139.178.89.23:22-43.153.207.95:51722.service: Deactivated successfully. Feb 9 21:01:45.878088 systemd[1]: Started sshd@66-139.178.89.23:22-139.178.89.65:40066.service. Feb 9 21:01:45.911308 sshd[2309]: Accepted publickey for core from 139.178.89.65 port 40066 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:45.912214 sshd[2309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:45.915072 systemd-logind[1456]: New session 40 of user core. Feb 9 21:01:45.915640 systemd[1]: Started session-40.scope. Feb 9 21:01:45.927720 systemd[1]: Started sshd@67-139.178.89.23:22-124.222.159.25:53300.service. Feb 9 21:01:45.967509 sshd[2309]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:45.969861 systemd[1]: sshd@66-139.178.89.23:22-139.178.89.65:40066.service: Deactivated successfully. Feb 9 21:01:45.970463 systemd[1]: session-40.scope: Deactivated successfully. Feb 9 21:01:45.971007 systemd-logind[1456]: Session 40 logged out. Waiting for processes to exit. Feb 9 21:01:45.971828 systemd[1]: Started sshd@68-139.178.89.23:22-139.178.89.65:40078.service. Feb 9 21:01:45.972558 systemd-logind[1456]: Removed session 40. Feb 9 21:01:46.006826 sshd[2318]: Accepted publickey for core from 139.178.89.65 port 40078 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:46.007676 sshd[2318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:46.010514 systemd-logind[1456]: New session 41 of user core. Feb 9 21:01:46.011442 systemd[1]: Started session-41.scope. Feb 9 21:01:46.064597 sshd[2318]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:46.065933 systemd[1]: sshd@68-139.178.89.23:22-139.178.89.65:40078.service: Deactivated successfully. Feb 9 21:01:46.066362 systemd[1]: session-41.scope: Deactivated successfully. Feb 9 21:01:46.066719 systemd-logind[1456]: Session 41 logged out. Waiting for processes to exit. Feb 9 21:01:46.067188 systemd-logind[1456]: Removed session 41. Feb 9 21:01:46.768033 sshd[2313]: Invalid user nejadm from 124.222.159.25 port 53300 Feb 9 21:01:46.774100 sshd[2313]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:46.775187 sshd[2313]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:01:46.775275 sshd[2313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.159.25 Feb 9 21:01:46.776213 sshd[2313]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:48.664346 sshd[2313]: Failed password for invalid user nejadm from 124.222.159.25 port 53300 ssh2 Feb 9 21:01:50.411537 sshd[2313]: Received disconnect from 124.222.159.25 port 53300:11: Bye Bye [preauth] Feb 9 21:01:50.411537 sshd[2313]: Disconnected from invalid user nejadm 124.222.159.25 port 53300 [preauth] Feb 9 21:01:50.414065 systemd[1]: sshd@67-139.178.89.23:22-124.222.159.25:53300.service: Deactivated successfully. Feb 9 21:01:50.955939 systemd[1]: Started sshd@69-139.178.89.23:22-103.237.87.215:45306.service. Feb 9 21:01:52.126932 sshd[2325]: Invalid user topgui from 103.237.87.215 port 45306 Feb 9 21:01:52.132902 sshd[2325]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:52.133971 sshd[2325]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:01:52.134056 sshd[2325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.237.87.215 Feb 9 21:01:52.134984 sshd[2325]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:54.513773 sshd[2325]: Failed password for invalid user topgui from 103.237.87.215 port 45306 ssh2 Feb 9 21:01:56.073828 systemd[1]: Started sshd@70-139.178.89.23:22-139.178.89.65:45378.service. Feb 9 21:01:56.107082 sshd[2328]: Accepted publickey for core from 139.178.89.65 port 45378 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:56.107907 sshd[2328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:56.110590 systemd-logind[1456]: New session 42 of user core. Feb 9 21:01:56.111489 systemd[1]: Started session-42.scope. Feb 9 21:01:56.167042 sshd[2328]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:56.168789 systemd[1]: sshd@70-139.178.89.23:22-139.178.89.65:45378.service: Deactivated successfully. Feb 9 21:01:56.169172 systemd[1]: session-42.scope: Deactivated successfully. Feb 9 21:01:56.169517 systemd-logind[1456]: Session 42 logged out. Waiting for processes to exit. Feb 9 21:01:56.170077 systemd[1]: Started sshd@71-139.178.89.23:22-139.178.89.65:45382.service. Feb 9 21:01:56.170537 systemd-logind[1456]: Removed session 42. Feb 9 21:01:56.203297 sshd[2335]: Accepted publickey for core from 139.178.89.65 port 45382 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:01:56.204087 sshd[2335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:01:56.206869 systemd-logind[1456]: New session 43 of user core. Feb 9 21:01:56.207724 systemd[1]: Started session-43.scope. Feb 9 21:01:56.262213 sshd[2335]: pam_unix(sshd:session): session closed for user core Feb 9 21:01:56.263435 systemd[1]: sshd@71-139.178.89.23:22-139.178.89.65:45382.service: Deactivated successfully. Feb 9 21:01:56.263863 systemd[1]: session-43.scope: Deactivated successfully. Feb 9 21:01:56.264214 systemd-logind[1456]: Session 43 logged out. Waiting for processes to exit. Feb 9 21:01:56.264763 systemd-logind[1456]: Removed session 43. Feb 9 21:01:57.019664 sshd[2325]: Received disconnect from 103.237.87.215 port 45306:11: Bye Bye [preauth] Feb 9 21:01:57.019664 sshd[2325]: Disconnected from invalid user topgui 103.237.87.215 port 45306 [preauth] Feb 9 21:01:57.022154 systemd[1]: sshd@69-139.178.89.23:22-103.237.87.215:45306.service: Deactivated successfully. Feb 9 21:01:57.280539 systemd[1]: Started sshd@72-139.178.89.23:22-175.139.200.245:33997.service. Feb 9 21:01:58.446376 sshd[2344]: Invalid user diportofacile from 175.139.200.245 port 33997 Feb 9 21:01:58.452307 sshd[2344]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:58.453434 sshd[2344]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:01:58.453519 sshd[2344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.200.245 Feb 9 21:01:58.454401 sshd[2344]: pam_faillock(sshd:auth): User unknown Feb 9 21:01:58.597026 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:01:58.596Z","caller":"v2discovery/discovery.go:361","msg":"error while waiting for peers","discovery-url":"https://discovery.etcd.io","error":"client: etcd cluster is unavailable or misconfigured; error #0: client: etcd member https://discovery.etcd.io returns server error [Gateway Timeout]\n","err-detail":"error #0: client: etcd member https://discovery.etcd.io returns server error [Gateway Timeout]\n"} Feb 9 21:01:58.597026 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:01:58.596Z","caller":"v2discovery/discovery.go:297","msg":"retry connecting to discovery service","url":"https://discovery.etcd.io","reason":"waiting for other nodes","backoff":"2s"} Feb 9 21:02:00.658267 sshd[2344]: Failed password for invalid user diportofacile from 175.139.200.245 port 33997 ssh2 Feb 9 21:02:00.690638 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:02:00.690Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"967872570d3885c9"} Feb 9 21:02:00.690638 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:02:00.690Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"59ba8d9751c40a95"} Feb 9 21:02:00.690638 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:02:00.690Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Feb 9 21:02:01.427479 sshd[2344]: Received disconnect from 175.139.200.245 port 33997:11: Bye Bye [preauth] Feb 9 21:02:01.427479 sshd[2344]: Disconnected from invalid user diportofacile 175.139.200.245 port 33997 [preauth] Feb 9 21:02:01.429969 systemd[1]: sshd@72-139.178.89.23:22-175.139.200.245:33997.service: Deactivated successfully. Feb 9 21:02:04.430638 systemd[1]: Started sshd@73-139.178.89.23:22-192.241.153.100:45120.service. Feb 9 21:02:04.850777 sshd[2348]: Invalid user huangzuxi from 192.241.153.100 port 45120 Feb 9 21:02:04.856804 sshd[2348]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:04.857846 sshd[2348]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:02:04.857933 sshd[2348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 21:02:04.858830 sshd[2348]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:06.012901 systemd[1]: Started sshd@74-139.178.89.23:22-101.43.121.33:44384.service. Feb 9 21:02:06.274833 systemd[1]: Started sshd@75-139.178.89.23:22-139.178.89.65:45798.service. Feb 9 21:02:06.313481 sshd[2354]: Accepted publickey for core from 139.178.89.65 port 45798 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:06.314316 sshd[2354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:06.317116 systemd-logind[1456]: New session 44 of user core. Feb 9 21:02:06.318031 systemd[1]: Started session-44.scope. Feb 9 21:02:06.372044 sshd[2354]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:06.373776 systemd[1]: sshd@75-139.178.89.23:22-139.178.89.65:45798.service: Deactivated successfully. Feb 9 21:02:06.374084 systemd[1]: session-44.scope: Deactivated successfully. Feb 9 21:02:06.374364 systemd-logind[1456]: Session 44 logged out. Waiting for processes to exit. Feb 9 21:02:06.374868 systemd[1]: Started sshd@76-139.178.89.23:22-139.178.89.65:45804.service. Feb 9 21:02:06.375251 systemd-logind[1456]: Removed session 44. Feb 9 21:02:06.408416 sshd[2360]: Accepted publickey for core from 139.178.89.65 port 45804 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:06.409311 sshd[2360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:06.412424 systemd-logind[1456]: New session 45 of user core. Feb 9 21:02:06.413091 systemd[1]: Started session-45.scope. Feb 9 21:02:06.479044 sshd[2360]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:06.484856 systemd[1]: sshd@76-139.178.89.23:22-139.178.89.65:45804.service: Deactivated successfully. Feb 9 21:02:06.486874 systemd[1]: session-45.scope: Deactivated successfully. Feb 9 21:02:06.488712 systemd-logind[1456]: Session 45 logged out. Waiting for processes to exit. Feb 9 21:02:06.490857 systemd-logind[1456]: Removed session 45. Feb 9 21:02:06.886859 sshd[2348]: Failed password for invalid user huangzuxi from 192.241.153.100 port 45120 ssh2 Feb 9 21:02:06.890265 sshd[2351]: Invalid user wangjiaying from 101.43.121.33 port 44384 Feb 9 21:02:06.896450 sshd[2351]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:06.897401 sshd[2351]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:02:06.897479 sshd[2351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:02:06.898312 sshd[2351]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:08.333636 sshd[2348]: Received disconnect from 192.241.153.100 port 45120:11: Bye Bye [preauth] Feb 9 21:02:08.333636 sshd[2348]: Disconnected from invalid user huangzuxi 192.241.153.100 port 45120 [preauth] Feb 9 21:02:08.336287 systemd[1]: sshd@73-139.178.89.23:22-192.241.153.100:45120.service: Deactivated successfully. Feb 9 21:02:08.866623 sshd[2351]: Failed password for invalid user wangjiaying from 101.43.121.33 port 44384 ssh2 Feb 9 21:02:10.859721 sshd[2351]: Received disconnect from 101.43.121.33 port 44384:11: Bye Bye [preauth] Feb 9 21:02:10.859721 sshd[2351]: Disconnected from invalid user wangjiaying 101.43.121.33 port 44384 [preauth] Feb 9 21:02:10.862252 systemd[1]: sshd@74-139.178.89.23:22-101.43.121.33:44384.service: Deactivated successfully. Feb 9 21:02:13.019645 systemd[1]: Started sshd@77-139.178.89.23:22-42.51.37.190:34440.service. Feb 9 21:02:13.899842 sshd[2369]: Invalid user tangchengfeng from 42.51.37.190 port 34440 Feb 9 21:02:13.905849 sshd[2369]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:13.906919 sshd[2369]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:02:13.907004 sshd[2369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.37.190 Feb 9 21:02:13.907993 sshd[2369]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:16.171605 sshd[2369]: Failed password for invalid user tangchengfeng from 42.51.37.190 port 34440 ssh2 Feb 9 21:02:16.487799 systemd[1]: Started sshd@78-139.178.89.23:22-139.178.89.65:49128.service. Feb 9 21:02:16.521384 sshd[2372]: Accepted publickey for core from 139.178.89.65 port 49128 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:16.522087 sshd[2372]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:16.524296 systemd-logind[1456]: New session 46 of user core. Feb 9 21:02:16.524982 systemd[1]: Started session-46.scope. Feb 9 21:02:16.576516 sshd[2372]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:16.578002 systemd[1]: sshd@78-139.178.89.23:22-139.178.89.65:49128.service: Deactivated successfully. Feb 9 21:02:16.578300 systemd[1]: session-46.scope: Deactivated successfully. Feb 9 21:02:16.578723 systemd-logind[1456]: Session 46 logged out. Waiting for processes to exit. Feb 9 21:02:16.579163 systemd[1]: Started sshd@79-139.178.89.23:22-139.178.89.65:49142.service. Feb 9 21:02:16.579560 systemd-logind[1456]: Removed session 46. Feb 9 21:02:16.612545 sshd[2378]: Accepted publickey for core from 139.178.89.65 port 49142 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:16.613346 sshd[2378]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:16.616135 systemd-logind[1456]: New session 47 of user core. Feb 9 21:02:16.616681 systemd[1]: Started session-47.scope. Feb 9 21:02:16.670323 sshd[2378]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:16.671681 systemd[1]: sshd@79-139.178.89.23:22-139.178.89.65:49142.service: Deactivated successfully. Feb 9 21:02:16.672071 systemd[1]: session-47.scope: Deactivated successfully. Feb 9 21:02:16.672347 systemd-logind[1456]: Session 47 logged out. Waiting for processes to exit. Feb 9 21:02:16.672976 systemd-logind[1456]: Removed session 47. Feb 9 21:02:16.744230 sshd[2369]: Received disconnect from 42.51.37.190 port 34440:11: Bye Bye [preauth] Feb 9 21:02:16.744230 sshd[2369]: Disconnected from invalid user tangchengfeng 42.51.37.190 port 34440 [preauth] Feb 9 21:02:16.746826 systemd[1]: sshd@77-139.178.89.23:22-42.51.37.190:34440.service: Deactivated successfully. Feb 9 21:02:26.679815 systemd[1]: Started sshd@80-139.178.89.23:22-139.178.89.65:47272.service. Feb 9 21:02:26.713581 sshd[2385]: Accepted publickey for core from 139.178.89.65 port 47272 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:26.714227 sshd[2385]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:26.716676 systemd-logind[1456]: New session 48 of user core. Feb 9 21:02:26.717076 systemd[1]: Started session-48.scope. Feb 9 21:02:26.768535 sshd[2385]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:26.770059 systemd[1]: sshd@80-139.178.89.23:22-139.178.89.65:47272.service: Deactivated successfully. Feb 9 21:02:26.770366 systemd[1]: session-48.scope: Deactivated successfully. Feb 9 21:02:26.770736 systemd-logind[1456]: Session 48 logged out. Waiting for processes to exit. Feb 9 21:02:26.771285 systemd[1]: Started sshd@81-139.178.89.23:22-139.178.89.65:47282.service. Feb 9 21:02:26.771806 systemd-logind[1456]: Removed session 48. Feb 9 21:02:26.804727 sshd[2391]: Accepted publickey for core from 139.178.89.65 port 47282 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:26.805652 sshd[2391]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:26.808727 systemd-logind[1456]: New session 49 of user core. Feb 9 21:02:26.809617 systemd[1]: Started session-49.scope. Feb 9 21:02:26.864345 sshd[2391]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:26.865710 systemd[1]: sshd@81-139.178.89.23:22-139.178.89.65:47282.service: Deactivated successfully. Feb 9 21:02:26.866109 systemd[1]: session-49.scope: Deactivated successfully. Feb 9 21:02:26.866449 systemd-logind[1456]: Session 49 logged out. Waiting for processes to exit. Feb 9 21:02:26.866911 systemd-logind[1456]: Removed session 49. Feb 9 21:02:30.573692 systemd[1]: Started sshd@82-139.178.89.23:22-218.92.0.113:33203.service. Feb 9 21:02:31.545252 sshd[2398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 21:02:33.003233 systemd[1]: Started sshd@83-139.178.89.23:22-121.11.103.144:57920.service. Feb 9 21:02:33.278148 sshd[2398]: Failed password for root from 218.92.0.113 port 33203 ssh2 Feb 9 21:02:33.966803 sshd[2401]: Invalid user taaaghi from 121.11.103.144 port 57920 Feb 9 21:02:33.972832 sshd[2401]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:33.973840 sshd[2401]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:02:33.973927 sshd[2401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.103.144 Feb 9 21:02:33.974830 sshd[2401]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:35.339206 sshd[2398]: Failed password for root from 218.92.0.113 port 33203 ssh2 Feb 9 21:02:35.647501 sshd[2401]: Failed password for invalid user taaaghi from 121.11.103.144 port 57920 ssh2 Feb 9 21:02:36.015964 sshd[2401]: Received disconnect from 121.11.103.144 port 57920:11: Bye Bye [preauth] Feb 9 21:02:36.015964 sshd[2401]: Disconnected from invalid user taaaghi 121.11.103.144 port 57920 [preauth] Feb 9 21:02:36.018448 systemd[1]: sshd@83-139.178.89.23:22-121.11.103.144:57920.service: Deactivated successfully. Feb 9 21:02:36.873708 systemd[1]: Started sshd@84-139.178.89.23:22-139.178.89.65:45528.service. Feb 9 21:02:36.906758 sshd[2405]: Accepted publickey for core from 139.178.89.65 port 45528 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:36.907633 sshd[2405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:36.910711 systemd-logind[1456]: New session 50 of user core. Feb 9 21:02:36.911566 systemd[1]: Started session-50.scope. Feb 9 21:02:36.966469 sshd[2405]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:36.967983 systemd[1]: sshd@84-139.178.89.23:22-139.178.89.65:45528.service: Deactivated successfully. Feb 9 21:02:36.968309 systemd[1]: session-50.scope: Deactivated successfully. Feb 9 21:02:36.968677 systemd-logind[1456]: Session 50 logged out. Waiting for processes to exit. Feb 9 21:02:36.969258 systemd[1]: Started sshd@85-139.178.89.23:22-139.178.89.65:45544.service. Feb 9 21:02:36.969679 systemd-logind[1456]: Removed session 50. Feb 9 21:02:37.002515 sshd[2411]: Accepted publickey for core from 139.178.89.65 port 45544 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:37.003316 sshd[2411]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:37.005891 systemd-logind[1456]: New session 51 of user core. Feb 9 21:02:37.006559 systemd[1]: Started session-51.scope. Feb 9 21:02:37.059753 sshd[2411]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:37.060954 systemd[1]: sshd@85-139.178.89.23:22-139.178.89.65:45544.service: Deactivated successfully. Feb 9 21:02:37.061398 systemd[1]: session-51.scope: Deactivated successfully. Feb 9 21:02:37.061773 systemd-logind[1456]: Session 51 logged out. Waiting for processes to exit. Feb 9 21:02:37.062247 systemd-logind[1456]: Removed session 51. Feb 9 21:02:37.405168 sshd[2398]: Failed password for root from 218.92.0.113 port 33203 ssh2 Feb 9 21:02:37.736712 systemd[1]: Started sshd@86-139.178.89.23:22-101.43.121.33:52954.service. Feb 9 21:02:37.909235 sshd[2398]: Received disconnect from 218.92.0.113 port 33203:11: [preauth] Feb 9 21:02:37.909235 sshd[2398]: Disconnected from authenticating user root 218.92.0.113 port 33203 [preauth] Feb 9 21:02:37.909775 sshd[2398]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 21:02:37.911805 systemd[1]: sshd@82-139.178.89.23:22-218.92.0.113:33203.service: Deactivated successfully. Feb 9 21:02:38.062887 systemd[1]: Started sshd@87-139.178.89.23:22-218.92.0.113:21996.service. Feb 9 21:02:38.580113 sshd[2417]: Invalid user hashida from 101.43.121.33 port 52954 Feb 9 21:02:38.586234 sshd[2417]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:38.587226 sshd[2417]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:02:38.587325 sshd[2417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:02:38.588262 sshd[2417]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:38.988637 systemd[1]: Started sshd@88-139.178.89.23:22-124.222.159.25:40334.service. Feb 9 21:02:39.024869 sshd[2421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 21:02:39.832936 sshd[2424]: Invalid user nouri from 124.222.159.25 port 40334 Feb 9 21:02:39.838946 sshd[2424]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:39.840015 sshd[2424]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:02:39.840102 sshd[2424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.159.25 Feb 9 21:02:39.841117 sshd[2424]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:40.616540 sshd[2417]: Failed password for invalid user hashida from 101.43.121.33 port 52954 ssh2 Feb 9 21:02:40.857262 sshd[2421]: Failed password for root from 218.92.0.113 port 21996 ssh2 Feb 9 21:02:41.004125 sshd[2417]: Received disconnect from 101.43.121.33 port 52954:11: Bye Bye [preauth] Feb 9 21:02:41.004125 sshd[2417]: Disconnected from invalid user hashida 101.43.121.33 port 52954 [preauth] Feb 9 21:02:41.006671 systemd[1]: sshd@86-139.178.89.23:22-101.43.121.33:52954.service: Deactivated successfully. Feb 9 21:02:41.144485 sshd[2421]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:02:41.673801 sshd[2424]: Failed password for invalid user nouri from 124.222.159.25 port 40334 ssh2 Feb 9 21:02:41.825601 sshd[2424]: Received disconnect from 124.222.159.25 port 40334:11: Bye Bye [preauth] Feb 9 21:02:41.825601 sshd[2424]: Disconnected from invalid user nouri 124.222.159.25 port 40334 [preauth] Feb 9 21:02:41.828104 systemd[1]: sshd@88-139.178.89.23:22-124.222.159.25:40334.service: Deactivated successfully. Feb 9 21:02:42.917065 sshd[2421]: Failed password for root from 218.92.0.113 port 21996 ssh2 Feb 9 21:02:44.976100 sshd[2421]: Failed password for root from 218.92.0.113 port 21996 ssh2 Feb 9 21:02:45.384850 sshd[2421]: Received disconnect from 218.92.0.113 port 21996:11: [preauth] Feb 9 21:02:45.384850 sshd[2421]: Disconnected from authenticating user root 218.92.0.113 port 21996 [preauth] Feb 9 21:02:45.385432 sshd[2421]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 21:02:45.387516 systemd[1]: sshd@87-139.178.89.23:22-218.92.0.113:21996.service: Deactivated successfully. Feb 9 21:02:45.519753 systemd[1]: Started sshd@89-139.178.89.23:22-218.92.0.113:11217.service. Feb 9 21:02:46.417854 sshd[2430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 21:02:47.069715 systemd[1]: Started sshd@90-139.178.89.23:22-139.178.89.65:35660.service. Feb 9 21:02:47.103145 sshd[2433]: Accepted publickey for core from 139.178.89.65 port 35660 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:47.103903 sshd[2433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:47.106153 systemd-logind[1456]: New session 52 of user core. Feb 9 21:02:47.106789 systemd[1]: Started session-52.scope. Feb 9 21:02:47.159493 sshd[2433]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:47.161153 systemd[1]: sshd@90-139.178.89.23:22-139.178.89.65:35660.service: Deactivated successfully. Feb 9 21:02:47.161497 systemd[1]: session-52.scope: Deactivated successfully. Feb 9 21:02:47.161844 systemd-logind[1456]: Session 52 logged out. Waiting for processes to exit. Feb 9 21:02:47.162440 systemd[1]: Started sshd@91-139.178.89.23:22-139.178.89.65:35670.service. Feb 9 21:02:47.162880 systemd-logind[1456]: Removed session 52. Feb 9 21:02:47.196432 sshd[2439]: Accepted publickey for core from 139.178.89.65 port 35670 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:47.197347 sshd[2439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:47.200249 systemd-logind[1456]: New session 53 of user core. Feb 9 21:02:47.201128 systemd[1]: Started session-53.scope. Feb 9 21:02:47.255383 sshd[2439]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:47.256652 systemd[1]: sshd@91-139.178.89.23:22-139.178.89.65:35670.service: Deactivated successfully. Feb 9 21:02:47.257041 systemd[1]: session-53.scope: Deactivated successfully. Feb 9 21:02:47.257319 systemd-logind[1456]: Session 53 logged out. Waiting for processes to exit. Feb 9 21:02:47.257793 systemd-logind[1456]: Removed session 53. Feb 9 21:02:48.877937 sshd[2430]: Failed password for root from 218.92.0.113 port 11217 ssh2 Feb 9 21:02:52.510544 sshd[2430]: Failed password for root from 218.92.0.113 port 11217 ssh2 Feb 9 21:02:53.738458 systemd[1]: Started sshd@92-139.178.89.23:22-43.153.207.95:44986.service. Feb 9 21:02:54.758445 sshd[2445]: Invalid user linhy from 43.153.207.95 port 44986 Feb 9 21:02:54.764477 sshd[2445]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:54.765472 sshd[2445]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:02:54.765561 sshd[2445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.207.95 Feb 9 21:02:54.766473 sshd[2445]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:56.143108 sshd[2430]: Failed password for root from 218.92.0.113 port 11217 ssh2 Feb 9 21:02:56.323410 sshd[2445]: Failed password for invalid user linhy from 43.153.207.95 port 44986 ssh2 Feb 9 21:02:56.695010 sshd[2430]: Received disconnect from 218.92.0.113 port 11217:11: [preauth] Feb 9 21:02:56.695010 sshd[2430]: Disconnected from authenticating user root 218.92.0.113 port 11217 [preauth] Feb 9 21:02:56.695527 sshd[2430]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 21:02:56.697546 systemd[1]: sshd@89-139.178.89.23:22-218.92.0.113:11217.service: Deactivated successfully. Feb 9 21:02:56.918266 sshd[2445]: Received disconnect from 43.153.207.95 port 44986:11: Bye Bye [preauth] Feb 9 21:02:56.918266 sshd[2445]: Disconnected from invalid user linhy 43.153.207.95 port 44986 [preauth] Feb 9 21:02:56.920861 systemd[1]: sshd@92-139.178.89.23:22-43.153.207.95:44986.service: Deactivated successfully. Feb 9 21:02:57.264561 systemd[1]: Started sshd@93-139.178.89.23:22-139.178.89.65:56874.service. Feb 9 21:02:57.297573 sshd[2452]: Accepted publickey for core from 139.178.89.65 port 56874 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:57.298396 sshd[2452]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:57.301082 systemd-logind[1456]: New session 54 of user core. Feb 9 21:02:57.301924 systemd[1]: Started session-54.scope. Feb 9 21:02:57.356458 sshd[2452]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:57.358253 systemd[1]: sshd@93-139.178.89.23:22-139.178.89.65:56874.service: Deactivated successfully. Feb 9 21:02:57.358577 systemd[1]: session-54.scope: Deactivated successfully. Feb 9 21:02:57.358910 systemd-logind[1456]: Session 54 logged out. Waiting for processes to exit. Feb 9 21:02:57.359512 systemd[1]: Started sshd@94-139.178.89.23:22-139.178.89.65:56888.service. Feb 9 21:02:57.359929 systemd-logind[1456]: Removed session 54. Feb 9 21:02:57.392829 sshd[2458]: Accepted publickey for core from 139.178.89.65 port 56888 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:02:57.393627 sshd[2458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:02:57.396191 systemd-logind[1456]: New session 55 of user core. Feb 9 21:02:57.396886 systemd[1]: Started session-55.scope. Feb 9 21:02:57.461210 sshd[2458]: pam_unix(sshd:session): session closed for user core Feb 9 21:02:57.466981 systemd[1]: sshd@94-139.178.89.23:22-139.178.89.65:56888.service: Deactivated successfully. Feb 9 21:02:57.469007 systemd[1]: session-55.scope: Deactivated successfully. Feb 9 21:02:57.470842 systemd-logind[1456]: Session 55 logged out. Waiting for processes to exit. Feb 9 21:02:57.472992 systemd-logind[1456]: Removed session 55. Feb 9 21:02:59.166652 systemd[1]: Started sshd@95-139.178.89.23:22-192.241.153.100:35204.service. Feb 9 21:02:59.373777 systemd[1]: Started sshd@96-139.178.89.23:22-103.237.87.215:36356.service. Feb 9 21:02:59.588061 sshd[2464]: Invalid user ayasalmahdi from 192.241.153.100 port 35204 Feb 9 21:02:59.594110 sshd[2464]: pam_faillock(sshd:auth): User unknown Feb 9 21:02:59.595179 sshd[2464]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:02:59.595266 sshd[2464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 21:02:59.596237 sshd[2464]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:01.129154 sshd[2467]: Invalid user ava from 103.237.87.215 port 36356 Feb 9 21:03:01.135258 sshd[2467]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:01.136016 sshd[2467]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:03:01.136033 sshd[2467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.237.87.215 Feb 9 21:03:01.136227 sshd[2467]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:01.173163 sshd[2464]: Failed password for invalid user ayasalmahdi from 192.241.153.100 port 35204 ssh2 Feb 9 21:03:02.220022 sshd[2464]: Received disconnect from 192.241.153.100 port 35204:11: Bye Bye [preauth] Feb 9 21:03:02.220022 sshd[2464]: Disconnected from invalid user ayasalmahdi 192.241.153.100 port 35204 [preauth] Feb 9 21:03:02.222344 systemd[1]: sshd@95-139.178.89.23:22-192.241.153.100:35204.service: Deactivated successfully. Feb 9 21:03:02.988822 sshd[2467]: Failed password for invalid user ava from 103.237.87.215 port 36356 ssh2 Feb 9 21:03:03.565934 sshd[2467]: Received disconnect from 103.237.87.215 port 36356:11: Bye Bye [preauth] Feb 9 21:03:03.565934 sshd[2467]: Disconnected from invalid user ava 103.237.87.215 port 36356 [preauth] Feb 9 21:03:03.568480 systemd[1]: sshd@96-139.178.89.23:22-103.237.87.215:36356.service: Deactivated successfully. Feb 9 21:03:04.683235 systemd[1]: Started sshd@97-139.178.89.23:22-175.139.200.245:45044.service. Feb 9 21:03:05.848771 sshd[2472]: Invalid user pbogaz from 175.139.200.245 port 45044 Feb 9 21:03:05.854771 sshd[2472]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:05.855734 sshd[2472]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:03:05.855816 sshd[2472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.200.245 Feb 9 21:03:05.856771 sshd[2472]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:07.470353 systemd[1]: Started sshd@98-139.178.89.23:22-139.178.89.65:35492.service. Feb 9 21:03:07.503577 sshd[2475]: Accepted publickey for core from 139.178.89.65 port 35492 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:07.504221 sshd[2475]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:07.506585 systemd-logind[1456]: New session 56 of user core. Feb 9 21:03:07.507311 systemd[1]: Started session-56.scope. Feb 9 21:03:07.558737 sshd[2475]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:07.560678 systemd[1]: sshd@98-139.178.89.23:22-139.178.89.65:35492.service: Deactivated successfully. Feb 9 21:03:07.561083 systemd[1]: session-56.scope: Deactivated successfully. Feb 9 21:03:07.561462 systemd-logind[1456]: Session 56 logged out. Waiting for processes to exit. Feb 9 21:03:07.562034 systemd[1]: Started sshd@99-139.178.89.23:22-139.178.89.65:35504.service. Feb 9 21:03:07.562494 systemd-logind[1456]: Removed session 56. Feb 9 21:03:07.589100 sshd[2472]: Failed password for invalid user pbogaz from 175.139.200.245 port 45044 ssh2 Feb 9 21:03:07.595476 sshd[2481]: Accepted publickey for core from 139.178.89.65 port 35504 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:07.596116 sshd[2481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:07.598285 systemd-logind[1456]: New session 57 of user core. Feb 9 21:03:07.599010 systemd[1]: Started session-57.scope. Feb 9 21:03:07.652094 sshd[2481]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:07.654402 systemd[1]: sshd@99-139.178.89.23:22-139.178.89.65:35504.service: Deactivated successfully. Feb 9 21:03:07.655392 systemd[1]: session-57.scope: Deactivated successfully. Feb 9 21:03:07.656228 systemd-logind[1456]: Session 57 logged out. Waiting for processes to exit. Feb 9 21:03:07.657306 systemd-logind[1456]: Removed session 57. Feb 9 21:03:09.260068 sshd[2472]: Received disconnect from 175.139.200.245 port 45044:11: Bye Bye [preauth] Feb 9 21:03:09.260068 sshd[2472]: Disconnected from invalid user pbogaz 175.139.200.245 port 45044 [preauth] Feb 9 21:03:09.262838 systemd[1]: sshd@97-139.178.89.23:22-175.139.200.245:45044.service: Deactivated successfully. Feb 9 21:03:09.293637 systemd[1]: Started sshd@100-139.178.89.23:22-101.43.121.33:33614.service. Feb 9 21:03:09.746265 systemd[1]: Started sshd@101-139.178.89.23:22-42.51.37.190:55288.service. Feb 9 21:03:10.134024 sshd[2488]: Invalid user ec2-user from 101.43.121.33 port 33614 Feb 9 21:03:10.135236 sshd[2488]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:10.135480 sshd[2488]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:03:10.135498 sshd[2488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:03:10.135695 sshd[2488]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:10.693786 sshd[2491]: Invalid user maokaiji from 42.51.37.190 port 55288 Feb 9 21:03:10.699830 sshd[2491]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:10.700941 sshd[2491]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:03:10.701030 sshd[2491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.37.190 Feb 9 21:03:10.702038 sshd[2491]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:12.223915 sshd[2488]: Failed password for invalid user ec2-user from 101.43.121.33 port 33614 ssh2 Feb 9 21:03:12.790635 sshd[2491]: Failed password for invalid user maokaiji from 42.51.37.190 port 55288 ssh2 Feb 9 21:03:13.329252 sshd[2488]: Received disconnect from 101.43.121.33 port 33614:11: Bye Bye [preauth] Feb 9 21:03:13.329252 sshd[2488]: Disconnected from invalid user ec2-user 101.43.121.33 port 33614 [preauth] Feb 9 21:03:13.331723 systemd[1]: sshd@100-139.178.89.23:22-101.43.121.33:33614.service: Deactivated successfully. Feb 9 21:03:13.849780 sshd[2491]: Received disconnect from 42.51.37.190 port 55288:11: Bye Bye [preauth] Feb 9 21:03:13.849780 sshd[2491]: Disconnected from invalid user maokaiji 42.51.37.190 port 55288 [preauth] Feb 9 21:03:13.852332 systemd[1]: sshd@101-139.178.89.23:22-42.51.37.190:55288.service: Deactivated successfully. Feb 9 21:03:17.661347 systemd[1]: Started sshd@102-139.178.89.23:22-139.178.89.65:38760.service. Feb 9 21:03:17.695083 sshd[2496]: Accepted publickey for core from 139.178.89.65 port 38760 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:17.695753 sshd[2496]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:17.697839 systemd-logind[1456]: New session 58 of user core. Feb 9 21:03:17.698483 systemd[1]: Started session-58.scope. Feb 9 21:03:17.750259 sshd[2496]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:17.752298 systemd[1]: sshd@102-139.178.89.23:22-139.178.89.65:38760.service: Deactivated successfully. Feb 9 21:03:17.752745 systemd[1]: session-58.scope: Deactivated successfully. Feb 9 21:03:17.753082 systemd-logind[1456]: Session 58 logged out. Waiting for processes to exit. Feb 9 21:03:17.753633 systemd[1]: Started sshd@103-139.178.89.23:22-139.178.89.65:38766.service. Feb 9 21:03:17.754089 systemd-logind[1456]: Removed session 58. Feb 9 21:03:17.787304 sshd[2502]: Accepted publickey for core from 139.178.89.65 port 38766 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:17.787984 sshd[2502]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:17.790224 systemd-logind[1456]: New session 59 of user core. Feb 9 21:03:17.790829 systemd[1]: Started session-59.scope. Feb 9 21:03:17.843790 sshd[2502]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:17.846951 systemd[1]: sshd@103-139.178.89.23:22-139.178.89.65:38766.service: Deactivated successfully. Feb 9 21:03:17.848108 systemd[1]: session-59.scope: Deactivated successfully. Feb 9 21:03:17.849313 systemd-logind[1456]: Session 59 logged out. Waiting for processes to exit. Feb 9 21:03:17.850947 systemd-logind[1456]: Removed session 59. Feb 9 21:03:27.852765 systemd[1]: Started sshd@104-139.178.89.23:22-139.178.89.65:55578.service. Feb 9 21:03:27.885799 sshd[2508]: Accepted publickey for core from 139.178.89.65 port 55578 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:27.886466 sshd[2508]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:27.888925 systemd-logind[1456]: New session 60 of user core. Feb 9 21:03:27.889544 systemd[1]: Started session-60.scope. Feb 9 21:03:27.941469 sshd[2508]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:27.944217 systemd[1]: sshd@104-139.178.89.23:22-139.178.89.65:55578.service: Deactivated successfully. Feb 9 21:03:27.944926 systemd[1]: session-60.scope: Deactivated successfully. Feb 9 21:03:27.945669 systemd-logind[1456]: Session 60 logged out. Waiting for processes to exit. Feb 9 21:03:27.946975 systemd[1]: Started sshd@105-139.178.89.23:22-139.178.89.65:55592.service. Feb 9 21:03:27.947975 systemd-logind[1456]: Removed session 60. Feb 9 21:03:27.993040 sshd[2514]: Accepted publickey for core from 139.178.89.65 port 55592 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:27.993709 sshd[2514]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:27.996160 systemd-logind[1456]: New session 61 of user core. Feb 9 21:03:27.996705 systemd[1]: Started session-61.scope. Feb 9 21:03:28.048878 sshd[2514]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:28.050043 systemd[1]: sshd@105-139.178.89.23:22-139.178.89.65:55592.service: Deactivated successfully. Feb 9 21:03:28.050436 systemd[1]: session-61.scope: Deactivated successfully. Feb 9 21:03:28.050858 systemd-logind[1456]: Session 61 logged out. Waiting for processes to exit. Feb 9 21:03:28.051240 systemd-logind[1456]: Removed session 61. Feb 9 21:03:38.058366 systemd[1]: Started sshd@106-139.178.89.23:22-139.178.89.65:47864.service. Feb 9 21:03:38.092222 sshd[2521]: Accepted publickey for core from 139.178.89.65 port 47864 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:38.092891 sshd[2521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:38.095323 systemd-logind[1456]: New session 62 of user core. Feb 9 21:03:38.095999 systemd[1]: Started session-62.scope. Feb 9 21:03:38.148548 sshd[2521]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:38.150293 systemd[1]: sshd@106-139.178.89.23:22-139.178.89.65:47864.service: Deactivated successfully. Feb 9 21:03:38.150758 systemd[1]: session-62.scope: Deactivated successfully. Feb 9 21:03:38.151103 systemd-logind[1456]: Session 62 logged out. Waiting for processes to exit. Feb 9 21:03:38.151827 systemd[1]: Started sshd@107-139.178.89.23:22-139.178.89.65:47878.service. Feb 9 21:03:38.152230 systemd-logind[1456]: Removed session 62. Feb 9 21:03:38.185567 sshd[2527]: Accepted publickey for core from 139.178.89.65 port 47878 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:38.186468 sshd[2527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:38.189536 systemd-logind[1456]: New session 63 of user core. Feb 9 21:03:38.190392 systemd[1]: Started session-63.scope. Feb 9 21:03:38.255418 sshd[2527]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:38.261207 systemd[1]: sshd@107-139.178.89.23:22-139.178.89.65:47878.service: Deactivated successfully. Feb 9 21:03:38.263058 systemd[1]: session-63.scope: Deactivated successfully. Feb 9 21:03:38.264670 systemd-logind[1456]: Session 63 logged out. Waiting for processes to exit. Feb 9 21:03:38.266983 systemd-logind[1456]: Removed session 63. Feb 9 21:03:38.840789 systemd[1]: Started sshd@108-139.178.89.23:22-121.11.103.144:48004.service. Feb 9 21:03:39.765297 sshd[2533]: Invalid user hajsedhossein from 121.11.103.144 port 48004 Feb 9 21:03:39.771370 sshd[2533]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:39.772431 sshd[2533]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:03:39.772516 sshd[2533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.103.144 Feb 9 21:03:39.773441 sshd[2533]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:41.842136 sshd[2533]: Failed password for invalid user hajsedhossein from 121.11.103.144 port 48004 ssh2 Feb 9 21:03:42.981775 sshd[2533]: Received disconnect from 121.11.103.144 port 48004:11: Bye Bye [preauth] Feb 9 21:03:42.981775 sshd[2533]: Disconnected from invalid user hajsedhossein 121.11.103.144 port 48004 [preauth] Feb 9 21:03:42.984311 systemd[1]: sshd@108-139.178.89.23:22-121.11.103.144:48004.service: Deactivated successfully. Feb 9 21:03:46.955533 systemd[1]: Started sshd@109-139.178.89.23:22-101.43.121.33:42364.service. Feb 9 21:03:47.749474 sshd[2537]: Invalid user okbangsu from 101.43.121.33 port 42364 Feb 9 21:03:47.755487 sshd[2537]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:47.756495 sshd[2537]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:03:47.756585 sshd[2537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:03:47.757643 sshd[2537]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:48.264756 systemd[1]: Started sshd@110-139.178.89.23:22-139.178.89.65:48436.service. Feb 9 21:03:48.298234 sshd[2540]: Accepted publickey for core from 139.178.89.65 port 48436 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:48.299053 sshd[2540]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:48.301952 systemd-logind[1456]: New session 64 of user core. Feb 9 21:03:48.302666 systemd[1]: Started session-64.scope. Feb 9 21:03:48.357363 sshd[2540]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:48.359073 systemd[1]: sshd@110-139.178.89.23:22-139.178.89.65:48436.service: Deactivated successfully. Feb 9 21:03:48.359450 systemd[1]: session-64.scope: Deactivated successfully. Feb 9 21:03:48.359808 systemd-logind[1456]: Session 64 logged out. Waiting for processes to exit. Feb 9 21:03:48.360413 systemd[1]: Started sshd@111-139.178.89.23:22-139.178.89.65:48438.service. Feb 9 21:03:48.360819 systemd-logind[1456]: Removed session 64. Feb 9 21:03:48.394130 sshd[2546]: Accepted publickey for core from 139.178.89.65 port 48438 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:48.395101 sshd[2546]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:48.398161 systemd-logind[1456]: New session 65 of user core. Feb 9 21:03:48.399161 systemd[1]: Started session-65.scope. Feb 9 21:03:48.454447 sshd[2546]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:48.455731 systemd[1]: sshd@111-139.178.89.23:22-139.178.89.65:48438.service: Deactivated successfully. Feb 9 21:03:48.456149 systemd[1]: session-65.scope: Deactivated successfully. Feb 9 21:03:48.456511 systemd-logind[1456]: Session 65 logged out. Waiting for processes to exit. Feb 9 21:03:48.457021 systemd-logind[1456]: Removed session 65. Feb 9 21:03:49.590581 sshd[2537]: Failed password for invalid user okbangsu from 101.43.121.33 port 42364 ssh2 Feb 9 21:03:50.976805 sshd[2537]: Received disconnect from 101.43.121.33 port 42364:11: Bye Bye [preauth] Feb 9 21:03:50.976805 sshd[2537]: Disconnected from invalid user okbangsu 101.43.121.33 port 42364 [preauth] Feb 9 21:03:50.979342 systemd[1]: sshd@109-139.178.89.23:22-101.43.121.33:42364.service: Deactivated successfully. Feb 9 21:03:56.407957 systemd[1]: Started sshd@112-139.178.89.23:22-192.241.153.100:57214.service. Feb 9 21:03:56.850062 sshd[2555]: Invalid user chensiyu from 192.241.153.100 port 57214 Feb 9 21:03:56.856082 sshd[2555]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:56.857210 sshd[2555]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:03:56.857298 sshd[2555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 21:03:56.858397 sshd[2555]: pam_faillock(sshd:auth): User unknown Feb 9 21:03:58.464432 systemd[1]: Started sshd@113-139.178.89.23:22-139.178.89.65:58916.service. Feb 9 21:03:58.497742 sshd[2559]: Accepted publickey for core from 139.178.89.65 port 58916 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:58.498618 sshd[2559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:58.501744 systemd-logind[1456]: New session 66 of user core. Feb 9 21:03:58.502716 systemd[1]: Started session-66.scope. Feb 9 21:03:58.558686 sshd[2559]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:58.560213 systemd[1]: sshd@113-139.178.89.23:22-139.178.89.65:58916.service: Deactivated successfully. Feb 9 21:03:58.560515 systemd[1]: session-66.scope: Deactivated successfully. Feb 9 21:03:58.560862 systemd-logind[1456]: Session 66 logged out. Waiting for processes to exit. Feb 9 21:03:58.561321 systemd[1]: Started sshd@114-139.178.89.23:22-139.178.89.65:58930.service. Feb 9 21:03:58.561748 systemd-logind[1456]: Removed session 66. Feb 9 21:03:58.595551 sshd[2565]: Accepted publickey for core from 139.178.89.65 port 58930 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:03:58.598469 sshd[2565]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:03:58.608036 systemd-logind[1456]: New session 67 of user core. Feb 9 21:03:58.610846 systemd[1]: Started session-67.scope. Feb 9 21:03:58.678601 sshd[2565]: pam_unix(sshd:session): session closed for user core Feb 9 21:03:58.679916 systemd[1]: sshd@114-139.178.89.23:22-139.178.89.65:58930.service: Deactivated successfully. Feb 9 21:03:58.680309 systemd[1]: session-67.scope: Deactivated successfully. Feb 9 21:03:58.680693 systemd-logind[1456]: Session 67 logged out. Waiting for processes to exit. Feb 9 21:03:58.681139 systemd-logind[1456]: Removed session 67. Feb 9 21:03:58.926237 sshd[2555]: Failed password for invalid user chensiyu from 192.241.153.100 port 57214 ssh2 Feb 9 21:04:01.021456 sshd[2555]: Received disconnect from 192.241.153.100 port 57214:11: Bye Bye [preauth] Feb 9 21:04:01.021456 sshd[2555]: Disconnected from invalid user chensiyu 192.241.153.100 port 57214 [preauth] Feb 9 21:04:01.024175 systemd[1]: sshd@112-139.178.89.23:22-192.241.153.100:57214.service: Deactivated successfully. Feb 9 21:04:08.462185 systemd[1]: Started sshd@115-139.178.89.23:22-103.237.87.215:55638.service. Feb 9 21:04:08.689928 systemd[1]: Started sshd@116-139.178.89.23:22-139.178.89.65:58000.service. Feb 9 21:04:08.728253 sshd[2577]: Accepted publickey for core from 139.178.89.65 port 58000 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:08.729043 sshd[2577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:08.731969 systemd-logind[1456]: New session 68 of user core. Feb 9 21:04:08.732497 systemd[1]: Started session-68.scope. Feb 9 21:04:08.785429 sshd[2577]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:08.786899 systemd[1]: sshd@116-139.178.89.23:22-139.178.89.65:58000.service: Deactivated successfully. Feb 9 21:04:08.787189 systemd[1]: session-68.scope: Deactivated successfully. Feb 9 21:04:08.787591 systemd-logind[1456]: Session 68 logged out. Waiting for processes to exit. Feb 9 21:04:08.788085 systemd[1]: Started sshd@117-139.178.89.23:22-139.178.89.65:58016.service. Feb 9 21:04:08.788463 systemd-logind[1456]: Removed session 68. Feb 9 21:04:08.821364 sshd[2583]: Accepted publickey for core from 139.178.89.65 port 58016 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:08.822260 sshd[2583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:08.825270 systemd-logind[1456]: New session 69 of user core. Feb 9 21:04:08.825945 systemd[1]: Started session-69.scope. Feb 9 21:04:08.881468 sshd[2583]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:08.882795 systemd[1]: sshd@117-139.178.89.23:22-139.178.89.65:58016.service: Deactivated successfully. Feb 9 21:04:08.883198 systemd[1]: session-69.scope: Deactivated successfully. Feb 9 21:04:08.883620 systemd-logind[1456]: Session 69 logged out. Waiting for processes to exit. Feb 9 21:04:08.884092 systemd-logind[1456]: Removed session 69. Feb 9 21:04:09.619295 sshd[2574]: Invalid user wojtek from 103.237.87.215 port 55638 Feb 9 21:04:09.625412 sshd[2574]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:09.626439 sshd[2574]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:04:09.626525 sshd[2574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.237.87.215 Feb 9 21:04:09.627428 sshd[2574]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:10.222393 systemd[1]: Started sshd@118-139.178.89.23:22-42.51.37.190:48946.service. Feb 9 21:04:10.661286 systemd[1]: Started sshd@119-139.178.89.23:22-43.153.207.95:52908.service. Feb 9 21:04:11.200749 sshd[2590]: Invalid user mehranbarber from 42.51.37.190 port 48946 Feb 9 21:04:11.206954 sshd[2590]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:11.208133 sshd[2590]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:04:11.208220 sshd[2590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.37.190 Feb 9 21:04:11.209295 sshd[2590]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:11.677057 sshd[2593]: Invalid user mnwork from 43.153.207.95 port 52908 Feb 9 21:04:11.683164 sshd[2593]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:11.684147 sshd[2593]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:04:11.684232 sshd[2593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.207.95 Feb 9 21:04:11.685204 sshd[2593]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:12.147788 sshd[2574]: Failed password for invalid user wojtek from 103.237.87.215 port 55638 ssh2 Feb 9 21:04:12.670764 sshd[2590]: Failed password for invalid user mehranbarber from 42.51.37.190 port 48946 ssh2 Feb 9 21:04:13.146732 sshd[2593]: Failed password for invalid user mnwork from 43.153.207.95 port 52908 ssh2 Feb 9 21:04:13.363408 sshd[2593]: Received disconnect from 43.153.207.95 port 52908:11: Bye Bye [preauth] Feb 9 21:04:13.363408 sshd[2593]: Disconnected from invalid user mnwork 43.153.207.95 port 52908 [preauth] Feb 9 21:04:13.365881 systemd[1]: sshd@119-139.178.89.23:22-43.153.207.95:52908.service: Deactivated successfully. Feb 9 21:04:13.809847 systemd[1]: Started sshd@120-139.178.89.23:22-175.139.200.245:56090.service. Feb 9 21:04:14.023684 sshd[2574]: Received disconnect from 103.237.87.215 port 55638:11: Bye Bye [preauth] Feb 9 21:04:14.023684 sshd[2574]: Disconnected from invalid user wojtek 103.237.87.215 port 55638 [preauth] Feb 9 21:04:14.026155 systemd[1]: sshd@115-139.178.89.23:22-103.237.87.215:55638.service: Deactivated successfully. Feb 9 21:04:14.072510 sshd[2590]: Received disconnect from 42.51.37.190 port 48946:11: Bye Bye [preauth] Feb 9 21:04:14.072510 sshd[2590]: Disconnected from invalid user mehranbarber 42.51.37.190 port 48946 [preauth] Feb 9 21:04:14.075029 systemd[1]: sshd@118-139.178.89.23:22-42.51.37.190:48946.service: Deactivated successfully. Feb 9 21:04:14.981213 sshd[2597]: Invalid user yihengxu from 175.139.200.245 port 56090 Feb 9 21:04:14.987326 sshd[2597]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:14.988295 sshd[2597]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:04:14.988419 sshd[2597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.200.245 Feb 9 21:04:14.989320 sshd[2597]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:17.198050 sshd[2597]: Failed password for invalid user yihengxu from 175.139.200.245 port 56090 ssh2 Feb 9 21:04:17.521219 sshd[2597]: Received disconnect from 175.139.200.245 port 56090:11: Bye Bye [preauth] Feb 9 21:04:17.521219 sshd[2597]: Disconnected from invalid user yihengxu 175.139.200.245 port 56090 [preauth] Feb 9 21:04:17.523800 systemd[1]: sshd@120-139.178.89.23:22-175.139.200.245:56090.service: Deactivated successfully. Feb 9 21:04:18.889901 systemd[1]: Started sshd@121-139.178.89.23:22-139.178.89.65:58110.service. Feb 9 21:04:18.923089 sshd[2603]: Accepted publickey for core from 139.178.89.65 port 58110 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:18.923997 sshd[2603]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:18.927128 systemd-logind[1456]: New session 70 of user core. Feb 9 21:04:18.927734 systemd[1]: Started session-70.scope. Feb 9 21:04:18.981543 sshd[2603]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:18.983094 systemd[1]: sshd@121-139.178.89.23:22-139.178.89.65:58110.service: Deactivated successfully. Feb 9 21:04:18.983403 systemd[1]: session-70.scope: Deactivated successfully. Feb 9 21:04:18.983773 systemd-logind[1456]: Session 70 logged out. Waiting for processes to exit. Feb 9 21:04:18.984264 systemd[1]: Started sshd@122-139.178.89.23:22-139.178.89.65:58126.service. Feb 9 21:04:18.984825 systemd-logind[1456]: Removed session 70. Feb 9 21:04:19.017512 sshd[2609]: Accepted publickey for core from 139.178.89.65 port 58126 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:19.018343 sshd[2609]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:19.021182 systemd-logind[1456]: New session 71 of user core. Feb 9 21:04:19.021793 systemd[1]: Started session-71.scope. Feb 9 21:04:19.085913 sshd[2609]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:19.091556 systemd[1]: sshd@122-139.178.89.23:22-139.178.89.65:58126.service: Deactivated successfully. Feb 9 21:04:19.093259 systemd[1]: session-71.scope: Deactivated successfully. Feb 9 21:04:19.094978 systemd-logind[1456]: Session 71 logged out. Waiting for processes to exit. Feb 9 21:04:19.097310 systemd-logind[1456]: Removed session 71. Feb 9 21:04:21.487040 systemd[1]: Started sshd@123-139.178.89.23:22-101.43.121.33:51040.service. Feb 9 21:04:22.308747 sshd[2616]: Invalid user topgui from 101.43.121.33 port 51040 Feb 9 21:04:22.314794 sshd[2616]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:22.315785 sshd[2616]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:04:22.315871 sshd[2616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:04:22.316800 sshd[2616]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:24.621419 sshd[2616]: Failed password for invalid user topgui from 101.43.121.33 port 51040 ssh2 Feb 9 21:04:24.790437 sshd[2616]: Received disconnect from 101.43.121.33 port 51040:11: Bye Bye [preauth] Feb 9 21:04:24.790437 sshd[2616]: Disconnected from invalid user topgui 101.43.121.33 port 51040 [preauth] Feb 9 21:04:24.793035 systemd[1]: sshd@123-139.178.89.23:22-101.43.121.33:51040.service: Deactivated successfully. Feb 9 21:04:29.094880 systemd[1]: Started sshd@124-139.178.89.23:22-139.178.89.65:34986.service. Feb 9 21:04:29.127989 sshd[2620]: Accepted publickey for core from 139.178.89.65 port 34986 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:29.128864 sshd[2620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:29.131981 systemd-logind[1456]: New session 72 of user core. Feb 9 21:04:29.132760 systemd[1]: Started session-72.scope. Feb 9 21:04:29.188268 sshd[2620]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:29.189871 systemd[1]: sshd@124-139.178.89.23:22-139.178.89.65:34986.service: Deactivated successfully. Feb 9 21:04:29.190193 systemd[1]: session-72.scope: Deactivated successfully. Feb 9 21:04:29.190577 systemd-logind[1456]: Session 72 logged out. Waiting for processes to exit. Feb 9 21:04:29.191155 systemd[1]: Started sshd@125-139.178.89.23:22-139.178.89.65:34994.service. Feb 9 21:04:29.191619 systemd-logind[1456]: Removed session 72. Feb 9 21:04:29.224859 sshd[2626]: Accepted publickey for core from 139.178.89.65 port 34994 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:29.225754 sshd[2626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:29.228936 systemd-logind[1456]: New session 73 of user core. Feb 9 21:04:29.229751 systemd[1]: Started session-73.scope. Feb 9 21:04:29.284629 sshd[2626]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:29.285929 systemd[1]: sshd@125-139.178.89.23:22-139.178.89.65:34994.service: Deactivated successfully. Feb 9 21:04:29.286328 systemd[1]: session-73.scope: Deactivated successfully. Feb 9 21:04:29.286721 systemd-logind[1456]: Session 73 logged out. Waiting for processes to exit. Feb 9 21:04:29.287222 systemd-logind[1456]: Removed session 73. Feb 9 21:04:39.293951 systemd[1]: Started sshd@126-139.178.89.23:22-139.178.89.65:54024.service. Feb 9 21:04:39.327589 sshd[2632]: Accepted publickey for core from 139.178.89.65 port 54024 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:39.328215 sshd[2632]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:39.330690 systemd-logind[1456]: New session 74 of user core. Feb 9 21:04:39.331213 systemd[1]: Started session-74.scope. Feb 9 21:04:39.383093 sshd[2632]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:39.384728 systemd[1]: sshd@126-139.178.89.23:22-139.178.89.65:54024.service: Deactivated successfully. Feb 9 21:04:39.385049 systemd[1]: session-74.scope: Deactivated successfully. Feb 9 21:04:39.385335 systemd-logind[1456]: Session 74 logged out. Waiting for processes to exit. Feb 9 21:04:39.385970 systemd[1]: Started sshd@127-139.178.89.23:22-139.178.89.65:54026.service. Feb 9 21:04:39.386354 systemd-logind[1456]: Removed session 74. Feb 9 21:04:39.419505 sshd[2638]: Accepted publickey for core from 139.178.89.65 port 54026 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:39.420364 sshd[2638]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:39.423189 systemd-logind[1456]: New session 75 of user core. Feb 9 21:04:39.423999 systemd[1]: Started session-75.scope. Feb 9 21:04:39.487605 sshd[2638]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:39.493383 systemd[1]: sshd@127-139.178.89.23:22-139.178.89.65:54026.service: Deactivated successfully. Feb 9 21:04:39.495282 systemd[1]: session-75.scope: Deactivated successfully. Feb 9 21:04:39.496893 systemd-logind[1456]: Session 75 logged out. Waiting for processes to exit. Feb 9 21:04:39.499238 systemd-logind[1456]: Removed session 75. Feb 9 21:04:49.496055 systemd[1]: Started sshd@128-139.178.89.23:22-139.178.89.65:59656.service. Feb 9 21:04:49.529552 sshd[2644]: Accepted publickey for core from 139.178.89.65 port 59656 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:49.530191 sshd[2644]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:49.532603 systemd-logind[1456]: New session 76 of user core. Feb 9 21:04:49.533111 systemd[1]: Started session-76.scope. Feb 9 21:04:49.585339 sshd[2644]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:49.586989 systemd[1]: sshd@128-139.178.89.23:22-139.178.89.65:59656.service: Deactivated successfully. Feb 9 21:04:49.587316 systemd[1]: session-76.scope: Deactivated successfully. Feb 9 21:04:49.587673 systemd-logind[1456]: Session 76 logged out. Waiting for processes to exit. Feb 9 21:04:49.588274 systemd[1]: Started sshd@129-139.178.89.23:22-139.178.89.65:59660.service. Feb 9 21:04:49.588745 systemd-logind[1456]: Removed session 76. Feb 9 21:04:49.622128 sshd[2650]: Accepted publickey for core from 139.178.89.65 port 59660 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:49.623204 sshd[2650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:49.626603 systemd-logind[1456]: New session 77 of user core. Feb 9 21:04:49.627364 systemd[1]: Started session-77.scope. Feb 9 21:04:49.682523 sshd[2650]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:49.683799 systemd[1]: sshd@129-139.178.89.23:22-139.178.89.65:59660.service: Deactivated successfully. Feb 9 21:04:49.684169 systemd[1]: session-77.scope: Deactivated successfully. Feb 9 21:04:49.684576 systemd-logind[1456]: Session 77 logged out. Waiting for processes to exit. Feb 9 21:04:49.685139 systemd-logind[1456]: Removed session 77. Feb 9 21:04:51.702596 systemd[1]: Started sshd@130-139.178.89.23:22-121.11.103.144:38092.service. Feb 9 21:04:52.617681 sshd[2657]: Invalid user gap from 121.11.103.144 port 38092 Feb 9 21:04:52.623705 sshd[2657]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:52.624815 sshd[2657]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:04:52.624902 sshd[2657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.103.144 Feb 9 21:04:52.625815 sshd[2657]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:54.231932 systemd[1]: Started sshd@131-139.178.89.23:22-192.241.153.100:48842.service. Feb 9 21:04:54.685868 sshd[2660]: Invalid user pbogaz from 192.241.153.100 port 48842 Feb 9 21:04:54.691957 sshd[2660]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:54.692692 sshd[2660]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:04:54.692709 sshd[2660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 21:04:54.692965 sshd[2660]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:55.050569 sshd[2657]: Failed password for invalid user gap from 121.11.103.144 port 38092 ssh2 Feb 9 21:04:55.432760 systemd[1]: Started sshd@132-139.178.89.23:22-101.43.121.33:60000.service. Feb 9 21:04:56.328447 sshd[2663]: Invalid user alborzrc from 101.43.121.33 port 60000 Feb 9 21:04:56.334464 sshd[2663]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:56.335469 sshd[2663]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:04:56.335554 sshd[2663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:04:56.336443 sshd[2663]: pam_faillock(sshd:auth): User unknown Feb 9 21:04:56.390241 sshd[2660]: Failed password for invalid user pbogaz from 192.241.153.100 port 48842 ssh2 Feb 9 21:04:57.145601 sshd[2657]: Received disconnect from 121.11.103.144 port 38092:11: Bye Bye [preauth] Feb 9 21:04:57.145601 sshd[2657]: Disconnected from invalid user gap 121.11.103.144 port 38092 [preauth] Feb 9 21:04:57.148115 systemd[1]: sshd@130-139.178.89.23:22-121.11.103.144:38092.service: Deactivated successfully. Feb 9 21:04:57.955463 sshd[2660]: Received disconnect from 192.241.153.100 port 48842:11: Bye Bye [preauth] Feb 9 21:04:57.955463 sshd[2660]: Disconnected from invalid user pbogaz 192.241.153.100 port 48842 [preauth] Feb 9 21:04:57.957948 systemd[1]: sshd@131-139.178.89.23:22-192.241.153.100:48842.service: Deactivated successfully. Feb 9 21:04:58.641208 sshd[2663]: Failed password for invalid user alborzrc from 101.43.121.33 port 60000 ssh2 Feb 9 21:04:59.692360 systemd[1]: Started sshd@133-139.178.89.23:22-139.178.89.65:45928.service. Feb 9 21:04:59.725777 sshd[2669]: Accepted publickey for core from 139.178.89.65 port 45928 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:59.726426 sshd[2669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:59.728861 systemd-logind[1456]: New session 78 of user core. Feb 9 21:04:59.729308 systemd[1]: Started session-78.scope. Feb 9 21:04:59.780228 sshd[2669]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:59.781870 systemd[1]: sshd@133-139.178.89.23:22-139.178.89.65:45928.service: Deactivated successfully. Feb 9 21:04:59.782183 systemd[1]: session-78.scope: Deactivated successfully. Feb 9 21:04:59.782593 systemd-logind[1456]: Session 78 logged out. Waiting for processes to exit. Feb 9 21:04:59.783105 systemd[1]: Started sshd@134-139.178.89.23:22-139.178.89.65:45942.service. Feb 9 21:04:59.783532 systemd-logind[1456]: Removed session 78. Feb 9 21:04:59.816898 sshd[2675]: Accepted publickey for core from 139.178.89.65 port 45942 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:04:59.817833 sshd[2675]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:04:59.821114 systemd-logind[1456]: New session 79 of user core. Feb 9 21:04:59.821751 systemd[1]: Started session-79.scope. Feb 9 21:04:59.886630 sshd[2675]: pam_unix(sshd:session): session closed for user core Feb 9 21:04:59.892248 systemd[1]: sshd@134-139.178.89.23:22-139.178.89.65:45942.service: Deactivated successfully. Feb 9 21:04:59.893962 systemd[1]: session-79.scope: Deactivated successfully. Feb 9 21:04:59.895541 systemd-logind[1456]: Session 79 logged out. Waiting for processes to exit. Feb 9 21:04:59.897828 systemd-logind[1456]: Removed session 79. Feb 9 21:05:00.260990 sshd[2663]: Received disconnect from 101.43.121.33 port 60000:11: Bye Bye [preauth] Feb 9 21:05:00.260990 sshd[2663]: Disconnected from invalid user alborzrc 101.43.121.33 port 60000 [preauth] Feb 9 21:05:00.263714 systemd[1]: sshd@132-139.178.89.23:22-101.43.121.33:60000.service: Deactivated successfully. Feb 9 21:05:00.736633 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:05:00.735Z","caller":"v2discovery/discovery.go:361","msg":"error while waiting for peers","discovery-url":"https://discovery.etcd.io","error":"client: etcd cluster is unavailable or misconfigured; error #0: client: etcd member https://discovery.etcd.io returns server error [Gateway Timeout]\n","err-detail":"error #0: client: etcd member https://discovery.etcd.io returns server error [Gateway Timeout]\n"} Feb 9 21:05:00.736633 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:05:00.735Z","caller":"v2discovery/discovery.go:297","msg":"retry connecting to discovery service","url":"https://discovery.etcd.io","reason":"waiting for other nodes","backoff":"4s"} Feb 9 21:05:04.834176 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:05:04.833Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"967872570d3885c9"} Feb 9 21:05:04.834176 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:05:04.833Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"59ba8d9751c40a95"} Feb 9 21:05:04.834176 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:05:04.833Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Feb 9 21:05:06.889826 systemd[1]: Started sshd@135-139.178.89.23:22-218.92.0.56:29054.service. Feb 9 21:05:07.854068 sshd[2682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:05:08.898012 systemd[1]: Started sshd@136-139.178.89.23:22-42.51.37.190:42150.service. Feb 9 21:05:09.874514 sshd[2685]: Invalid user user6 from 42.51.37.190 port 42150 Feb 9 21:05:09.880542 sshd[2685]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:09.881547 sshd[2685]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:05:09.881634 sshd[2685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.37.190 Feb 9 21:05:09.882645 sshd[2685]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:09.895659 systemd[1]: Started sshd@137-139.178.89.23:22-139.178.89.65:51244.service. Feb 9 21:05:09.928877 sshd[2688]: Accepted publickey for core from 139.178.89.65 port 51244 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:05:09.929519 sshd[2688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:05:09.932012 systemd-logind[1456]: New session 80 of user core. Feb 9 21:05:09.932486 systemd[1]: Started session-80.scope. Feb 9 21:05:09.994801 sshd[2688]: pam_unix(sshd:session): session closed for user core Feb 9 21:05:10.001242 systemd[1]: sshd@137-139.178.89.23:22-139.178.89.65:51244.service: Deactivated successfully. Feb 9 21:05:10.002447 systemd[1]: session-80.scope: Deactivated successfully. Feb 9 21:05:10.002532 sshd[2682]: Failed password for root from 218.92.0.56 port 29054 ssh2 Feb 9 21:05:10.002802 systemd-logind[1456]: Session 80 logged out. Waiting for processes to exit. Feb 9 21:05:10.003365 systemd[1]: Started sshd@138-139.178.89.23:22-139.178.89.65:51248.service. Feb 9 21:05:10.003805 systemd-logind[1456]: Removed session 80. Feb 9 21:05:10.036491 sshd[2694]: Accepted publickey for core from 139.178.89.65 port 51248 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:05:10.037359 sshd[2694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:05:10.040142 systemd-logind[1456]: New session 81 of user core. Feb 9 21:05:10.040954 systemd[1]: Started session-81.scope. Feb 9 21:05:10.105182 sshd[2694]: pam_unix(sshd:session): session closed for user core Feb 9 21:05:10.110797 systemd[1]: sshd@138-139.178.89.23:22-139.178.89.65:51248.service: Deactivated successfully. Feb 9 21:05:10.112644 systemd[1]: session-81.scope: Deactivated successfully. Feb 9 21:05:10.114333 systemd-logind[1456]: Session 81 logged out. Waiting for processes to exit. Feb 9 21:05:10.116572 systemd-logind[1456]: Removed session 81. Feb 9 21:05:12.307543 sshd[2685]: Failed password for invalid user user6 from 42.51.37.190 port 42150 ssh2 Feb 9 21:05:13.982714 sshd[2682]: Failed password for root from 218.92.0.56 port 29054 ssh2 Feb 9 21:05:14.697387 sshd[2685]: Received disconnect from 42.51.37.190 port 42150:11: Bye Bye [preauth] Feb 9 21:05:14.697387 sshd[2685]: Disconnected from invalid user user6 42.51.37.190 port 42150 [preauth] Feb 9 21:05:14.699930 systemd[1]: sshd@136-139.178.89.23:22-42.51.37.190:42150.service: Deactivated successfully. Feb 9 21:05:17.981972 systemd[1]: Started sshd@139-139.178.89.23:22-103.237.87.215:46688.service. Feb 9 21:05:18.429406 sshd[2682]: Failed password for root from 218.92.0.56 port 29054 ssh2 Feb 9 21:05:19.188992 sshd[2702]: Invalid user delshad from 103.237.87.215 port 46688 Feb 9 21:05:19.195100 sshd[2702]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:19.196141 sshd[2702]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:05:19.196229 sshd[2702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.237.87.215 Feb 9 21:05:19.197213 sshd[2702]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:20.114332 systemd[1]: Started sshd@140-139.178.89.23:22-139.178.89.65:37262.service. Feb 9 21:05:20.141311 sshd[2682]: Received disconnect from 218.92.0.56 port 29054:11: [preauth] Feb 9 21:05:20.141311 sshd[2682]: Disconnected from authenticating user root 218.92.0.56 port 29054 [preauth] Feb 9 21:05:20.141420 sshd[2682]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:05:20.141910 systemd[1]: sshd@135-139.178.89.23:22-218.92.0.56:29054.service: Deactivated successfully. Feb 9 21:05:20.147509 sshd[2705]: Accepted publickey for core from 139.178.89.65 port 37262 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:05:20.148325 sshd[2705]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:05:20.151144 systemd-logind[1456]: New session 82 of user core. Feb 9 21:05:20.151977 systemd[1]: Started session-82.scope. Feb 9 21:05:20.207894 sshd[2705]: pam_unix(sshd:session): session closed for user core Feb 9 21:05:20.209492 systemd[1]: sshd@140-139.178.89.23:22-139.178.89.65:37262.service: Deactivated successfully. Feb 9 21:05:20.209813 systemd[1]: session-82.scope: Deactivated successfully. Feb 9 21:05:20.210095 systemd-logind[1456]: Session 82 logged out. Waiting for processes to exit. Feb 9 21:05:20.210743 systemd[1]: Started sshd@141-139.178.89.23:22-139.178.89.65:37270.service. Feb 9 21:05:20.211140 systemd-logind[1456]: Removed session 82. Feb 9 21:05:20.243861 sshd[2712]: Accepted publickey for core from 139.178.89.65 port 37270 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:05:20.244640 sshd[2712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:05:20.247552 systemd-logind[1456]: New session 83 of user core. Feb 9 21:05:20.248153 systemd[1]: Started session-83.scope. Feb 9 21:05:20.295535 systemd[1]: Started sshd@142-139.178.89.23:22-218.92.0.56:60619.service. Feb 9 21:05:20.301794 sshd[2712]: pam_unix(sshd:session): session closed for user core Feb 9 21:05:20.302946 systemd[1]: sshd@141-139.178.89.23:22-139.178.89.65:37270.service: Deactivated successfully. Feb 9 21:05:20.303286 systemd[1]: session-83.scope: Deactivated successfully. Feb 9 21:05:20.303673 systemd-logind[1456]: Session 83 logged out. Waiting for processes to exit. Feb 9 21:05:20.304069 systemd-logind[1456]: Removed session 83. Feb 9 21:05:21.272702 sshd[2718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:05:21.326292 sshd[2702]: Failed password for invalid user delshad from 103.237.87.215 port 46688 ssh2 Feb 9 21:05:22.835396 sshd[2702]: Received disconnect from 103.237.87.215 port 46688:11: Bye Bye [preauth] Feb 9 21:05:22.835396 sshd[2702]: Disconnected from invalid user delshad 103.237.87.215 port 46688 [preauth] Feb 9 21:05:22.837949 systemd[1]: sshd@139-139.178.89.23:22-103.237.87.215:46688.service: Deactivated successfully. Feb 9 21:05:23.512233 systemd[1]: Started sshd@143-139.178.89.23:22-175.139.200.245:38903.service. Feb 9 21:05:24.013501 sshd[2718]: Failed password for root from 218.92.0.56 port 60619 ssh2 Feb 9 21:05:24.679400 sshd[2723]: Invalid user roza from 175.139.200.245 port 38903 Feb 9 21:05:24.685557 sshd[2723]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:24.686644 sshd[2723]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:05:24.686732 sshd[2723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.200.245 Feb 9 21:05:24.687757 sshd[2723]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:25.367722 sshd[2718]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:05:26.505160 sshd[2723]: Failed password for invalid user roza from 175.139.200.245 port 38903 ssh2 Feb 9 21:05:27.221954 sshd[2723]: Received disconnect from 175.139.200.245 port 38903:11: Bye Bye [preauth] Feb 9 21:05:27.221954 sshd[2723]: Disconnected from invalid user roza 175.139.200.245 port 38903 [preauth] Feb 9 21:05:27.224437 systemd[1]: sshd@143-139.178.89.23:22-175.139.200.245:38903.service: Deactivated successfully. Feb 9 21:05:27.321034 sshd[2718]: Failed password for root from 218.92.0.56 port 60619 ssh2 Feb 9 21:05:29.716958 sshd[2718]: Failed password for root from 218.92.0.56 port 60619 ssh2 Feb 9 21:05:30.184295 systemd[1]: Started sshd@144-139.178.89.23:22-101.43.121.33:40394.service. Feb 9 21:05:30.311274 systemd[1]: Started sshd@145-139.178.89.23:22-139.178.89.65:54872.service. Feb 9 21:05:30.344493 sshd[2730]: Accepted publickey for core from 139.178.89.65 port 54872 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:05:30.345299 sshd[2730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:05:30.348020 systemd-logind[1456]: New session 84 of user core. Feb 9 21:05:30.348533 systemd[1]: Started session-84.scope. Feb 9 21:05:30.414681 sshd[2730]: pam_unix(sshd:session): session closed for user core Feb 9 21:05:30.421115 systemd[1]: sshd@145-139.178.89.23:22-139.178.89.65:54872.service: Deactivated successfully. Feb 9 21:05:30.422070 systemd[1]: session-84.scope: Deactivated successfully. Feb 9 21:05:30.422328 systemd-logind[1456]: Session 84 logged out. Waiting for processes to exit. Feb 9 21:05:30.422861 systemd[1]: Started sshd@146-139.178.89.23:22-139.178.89.65:54878.service. Feb 9 21:05:30.423205 systemd-logind[1456]: Removed session 84. Feb 9 21:05:30.456042 sshd[2736]: Accepted publickey for core from 139.178.89.65 port 54878 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:05:30.456807 sshd[2736]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:05:30.459552 systemd-logind[1456]: New session 85 of user core. Feb 9 21:05:30.460118 systemd[1]: Started session-85.scope. Feb 9 21:05:30.514775 sshd[2736]: pam_unix(sshd:session): session closed for user core Feb 9 21:05:30.516044 systemd[1]: sshd@146-139.178.89.23:22-139.178.89.65:54878.service: Deactivated successfully. Feb 9 21:05:30.516459 systemd[1]: session-85.scope: Deactivated successfully. Feb 9 21:05:30.516849 systemd-logind[1456]: Session 85 logged out. Waiting for processes to exit. Feb 9 21:05:30.517303 systemd-logind[1456]: Removed session 85. Feb 9 21:05:31.044320 sshd[2727]: Invalid user appu from 101.43.121.33 port 40394 Feb 9 21:05:31.050471 sshd[2727]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:31.051468 sshd[2727]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:05:31.051555 sshd[2727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:05:31.052447 sshd[2727]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:31.582391 sshd[2718]: Received disconnect from 218.92.0.56 port 60619:11: [preauth] Feb 9 21:05:31.582391 sshd[2718]: Disconnected from authenticating user root 218.92.0.56 port 60619 [preauth] Feb 9 21:05:31.582930 sshd[2718]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:05:31.584972 systemd[1]: sshd@142-139.178.89.23:22-218.92.0.56:60619.service: Deactivated successfully. Feb 9 21:05:31.714050 systemd[1]: Started sshd@147-139.178.89.23:22-218.92.0.56:26729.service. Feb 9 21:05:32.623744 sshd[2744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:05:32.830062 sshd[2727]: Failed password for invalid user appu from 101.43.121.33 port 40394 ssh2 Feb 9 21:05:33.260916 sshd[2727]: Received disconnect from 101.43.121.33 port 40394:11: Bye Bye [preauth] Feb 9 21:05:33.260916 sshd[2727]: Disconnected from invalid user appu 101.43.121.33 port 40394 [preauth] Feb 9 21:05:33.263455 systemd[1]: sshd@144-139.178.89.23:22-101.43.121.33:40394.service: Deactivated successfully. Feb 9 21:05:34.205706 sshd[2744]: Failed password for root from 218.92.0.56 port 26729 ssh2 Feb 9 21:05:37.593092 sshd[2744]: Failed password for root from 218.92.0.56 port 26729 ssh2 Feb 9 21:05:38.217082 systemd[1]: Started sshd@148-139.178.89.23:22-43.153.207.95:37956.service. Feb 9 21:05:39.229459 sshd[2748]: Invalid user huangzuxi from 43.153.207.95 port 37956 Feb 9 21:05:39.235489 sshd[2748]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:39.236650 sshd[2748]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:05:39.236739 sshd[2748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.207.95 Feb 9 21:05:39.237772 sshd[2748]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:40.524331 systemd[1]: Started sshd@149-139.178.89.23:22-139.178.89.65:47794.service. Feb 9 21:05:40.557482 sshd[2751]: Accepted publickey for core from 139.178.89.65 port 47794 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:05:40.558327 sshd[2751]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:05:40.561314 systemd-logind[1456]: New session 86 of user core. Feb 9 21:05:40.561970 systemd[1]: Started session-86.scope. Feb 9 21:05:40.616021 sshd[2751]: pam_unix(sshd:session): session closed for user core Feb 9 21:05:40.617627 systemd[1]: sshd@149-139.178.89.23:22-139.178.89.65:47794.service: Deactivated successfully. Feb 9 21:05:40.617932 systemd[1]: session-86.scope: Deactivated successfully. Feb 9 21:05:40.618254 systemd-logind[1456]: Session 86 logged out. Waiting for processes to exit. Feb 9 21:05:40.618778 systemd[1]: Started sshd@150-139.178.89.23:22-139.178.89.65:47800.service. Feb 9 21:05:40.619203 systemd-logind[1456]: Removed session 86. Feb 9 21:05:40.652078 sshd[2757]: Accepted publickey for core from 139.178.89.65 port 47800 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:05:40.652797 sshd[2757]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:05:40.655064 systemd-logind[1456]: New session 87 of user core. Feb 9 21:05:40.655560 systemd[1]: Started session-87.scope. Feb 9 21:05:40.707411 sshd[2757]: pam_unix(sshd:session): session closed for user core Feb 9 21:05:40.710080 systemd[1]: sshd@150-139.178.89.23:22-139.178.89.65:47800.service: Deactivated successfully. Feb 9 21:05:40.711017 systemd[1]: session-87.scope: Deactivated successfully. Feb 9 21:05:40.711934 systemd-logind[1456]: Session 87 logged out. Waiting for processes to exit. Feb 9 21:05:40.713184 systemd-logind[1456]: Removed session 87. Feb 9 21:05:41.227163 sshd[2744]: Failed password for root from 218.92.0.56 port 26729 ssh2 Feb 9 21:05:41.446978 sshd[2748]: Failed password for invalid user huangzuxi from 43.153.207.95 port 37956 ssh2 Feb 9 21:05:42.830510 sshd[2748]: Received disconnect from 43.153.207.95 port 37956:11: Bye Bye [preauth] Feb 9 21:05:42.830510 sshd[2748]: Disconnected from invalid user huangzuxi 43.153.207.95 port 37956 [preauth] Feb 9 21:05:42.833010 systemd[1]: sshd@148-139.178.89.23:22-43.153.207.95:37956.service: Deactivated successfully. Feb 9 21:05:42.908014 sshd[2744]: Received disconnect from 218.92.0.56 port 26729:11: [preauth] Feb 9 21:05:42.908014 sshd[2744]: Disconnected from authenticating user root 218.92.0.56 port 26729 [preauth] Feb 9 21:05:42.908555 sshd[2744]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:05:42.910664 systemd[1]: sshd@147-139.178.89.23:22-218.92.0.56:26729.service: Deactivated successfully. Feb 9 21:05:50.716665 systemd[1]: Started sshd@151-139.178.89.23:22-139.178.89.65:55712.service. Feb 9 21:05:50.749903 sshd[2766]: Accepted publickey for core from 139.178.89.65 port 55712 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:05:50.750615 sshd[2766]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:05:50.753181 systemd-logind[1456]: New session 88 of user core. Feb 9 21:05:50.753665 systemd[1]: Started session-88.scope. Feb 9 21:05:50.804494 sshd[2766]: pam_unix(sshd:session): session closed for user core Feb 9 21:05:50.806023 systemd[1]: sshd@151-139.178.89.23:22-139.178.89.65:55712.service: Deactivated successfully. Feb 9 21:05:50.806307 systemd[1]: session-88.scope: Deactivated successfully. Feb 9 21:05:50.806749 systemd-logind[1456]: Session 88 logged out. Waiting for processes to exit. Feb 9 21:05:50.807183 systemd[1]: Started sshd@152-139.178.89.23:22-139.178.89.65:55720.service. Feb 9 21:05:50.807645 systemd-logind[1456]: Removed session 88. Feb 9 21:05:50.842051 sshd[2774]: Accepted publickey for core from 139.178.89.65 port 55720 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:05:50.842980 sshd[2774]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:05:50.846193 systemd-logind[1456]: New session 89 of user core. Feb 9 21:05:50.846819 systemd[1]: Started session-89.scope. Feb 9 21:05:50.910070 sshd[2774]: pam_unix(sshd:session): session closed for user core Feb 9 21:05:50.915234 systemd[1]: sshd@152-139.178.89.23:22-139.178.89.65:55720.service: Deactivated successfully. Feb 9 21:05:50.916760 systemd[1]: session-89.scope: Deactivated successfully. Feb 9 21:05:50.918316 systemd-logind[1456]: Session 89 logged out. Waiting for processes to exit. Feb 9 21:05:50.920496 systemd-logind[1456]: Removed session 89. Feb 9 21:05:53.259116 systemd[1]: Started sshd@153-139.178.89.23:22-192.241.153.100:42430.service. Feb 9 21:05:53.682974 sshd[2781]: Invalid user rasoulbehboodi from 192.241.153.100 port 42430 Feb 9 21:05:53.689018 sshd[2781]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:53.690168 sshd[2781]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:05:53.690256 sshd[2781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 21:05:53.691195 sshd[2781]: pam_faillock(sshd:auth): User unknown Feb 9 21:05:55.488921 sshd[2781]: Failed password for invalid user rasoulbehboodi from 192.241.153.100 port 42430 ssh2 Feb 9 21:05:55.953247 sshd[2781]: Received disconnect from 192.241.153.100 port 42430:11: Bye Bye [preauth] Feb 9 21:05:55.953247 sshd[2781]: Disconnected from invalid user rasoulbehboodi 192.241.153.100 port 42430 [preauth] Feb 9 21:05:55.955832 systemd[1]: sshd@153-139.178.89.23:22-192.241.153.100:42430.service: Deactivated successfully. Feb 9 21:06:00.919342 systemd[1]: Started sshd@154-139.178.89.23:22-139.178.89.65:50400.service. Feb 9 21:06:00.953159 sshd[2785]: Accepted publickey for core from 139.178.89.65 port 50400 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:00.954052 sshd[2785]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:00.957160 systemd-logind[1456]: New session 90 of user core. Feb 9 21:06:00.957751 systemd[1]: Started session-90.scope. Feb 9 21:06:01.023931 sshd[2785]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:01.030496 systemd[1]: sshd@154-139.178.89.23:22-139.178.89.65:50400.service: Deactivated successfully. Feb 9 21:06:01.031247 systemd[1]: session-90.scope: Deactivated successfully. Feb 9 21:06:01.031708 systemd-logind[1456]: Session 90 logged out. Waiting for processes to exit. Feb 9 21:06:01.032124 systemd[1]: Started sshd@155-139.178.89.23:22-139.178.89.65:50414.service. Feb 9 21:06:01.032570 systemd-logind[1456]: Removed session 90. Feb 9 21:06:01.065524 sshd[2791]: Accepted publickey for core from 139.178.89.65 port 50414 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:01.066231 sshd[2791]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:01.068759 systemd-logind[1456]: New session 91 of user core. Feb 9 21:06:01.069194 systemd[1]: Started session-91.scope. Feb 9 21:06:01.127123 sshd[2791]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:01.132748 systemd[1]: sshd@155-139.178.89.23:22-139.178.89.65:50414.service: Deactivated successfully. Feb 9 21:06:01.134504 systemd[1]: session-91.scope: Deactivated successfully. Feb 9 21:06:01.136198 systemd-logind[1456]: Session 91 logged out. Waiting for processes to exit. Feb 9 21:06:01.138539 systemd-logind[1456]: Removed session 91. Feb 9 21:06:01.389527 update_engine[1458]: I0209 21:06:01.389410 1458 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 21:06:01.389527 update_engine[1458]: I0209 21:06:01.389489 1458 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 21:06:01.391115 update_engine[1458]: I0209 21:06:01.391036 1458 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 21:06:01.391993 update_engine[1458]: I0209 21:06:01.391913 1458 omaha_request_params.cc:62] Current group set to lts Feb 9 21:06:01.392212 update_engine[1458]: I0209 21:06:01.392189 1458 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 21:06:01.392212 update_engine[1458]: I0209 21:06:01.392208 1458 update_attempter.cc:643] Scheduling an action processor start. Feb 9 21:06:01.392467 update_engine[1458]: I0209 21:06:01.392241 1458 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 21:06:01.392467 update_engine[1458]: I0209 21:06:01.392303 1458 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 21:06:01.392667 update_engine[1458]: I0209 21:06:01.392464 1458 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 21:06:01.392667 update_engine[1458]: I0209 21:06:01.392483 1458 omaha_request_action.cc:271] Request: <?xml version="1.0" encoding="UTF-8"?> Feb 9 21:06:01.392667 update_engine[1458]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1"> Feb 9 21:06:01.392667 update_engine[1458]: <os version="Chateau" platform="CoreOS" sp="3510.3.2_x86_64"></os> Feb 9 21:06:01.392667 update_engine[1458]: <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="3510.3.2" track="lts" bootid="{5d6646d7-39ce-4316-9840-1abf51b56b18}" oem="packet" oemversion="0.2.2" alephversion="3510.3.2" machineid="2afa3269441d444280311337f2bec5e3" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" > Feb 9 21:06:01.392667 update_engine[1458]: <ping active="1"></ping> Feb 9 21:06:01.392667 update_engine[1458]: <updatecheck></updatecheck> Feb 9 21:06:01.392667 update_engine[1458]: <event eventtype="3" eventresult="2" previousversion="0.0.0.0"></event> Feb 9 21:06:01.392667 update_engine[1458]: </app> Feb 9 21:06:01.392667 update_engine[1458]: </request> Feb 9 21:06:01.392667 update_engine[1458]: I0209 21:06:01.392493 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:06:01.393643 locksmithd[1497]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 21:06:01.395648 update_engine[1458]: I0209 21:06:01.395553 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:06:01.395856 update_engine[1458]: E0209 21:06:01.395776 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:06:01.395969 update_engine[1458]: I0209 21:06:01.395929 1458 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 21:06:02.868234 systemd[1]: Started sshd@156-139.178.89.23:22-101.43.121.33:49226.service. Feb 9 21:06:03.728900 sshd[2797]: Invalid user bv from 101.43.121.33 port 49226 Feb 9 21:06:03.735010 sshd[2797]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:03.736194 sshd[2797]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:06:03.736282 sshd[2797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:06:03.737250 sshd[2797]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:05.906546 sshd[2797]: Failed password for invalid user bv from 101.43.121.33 port 49226 ssh2 Feb 9 21:06:07.111671 sshd[2797]: Received disconnect from 101.43.121.33 port 49226:11: Bye Bye [preauth] Feb 9 21:06:07.111671 sshd[2797]: Disconnected from invalid user bv 101.43.121.33 port 49226 [preauth] Feb 9 21:06:07.114162 systemd[1]: sshd@156-139.178.89.23:22-101.43.121.33:49226.service: Deactivated successfully. Feb 9 21:06:08.230839 systemd[1]: Started sshd@157-139.178.89.23:22-42.51.37.190:35044.service. Feb 9 21:06:08.863205 systemd[1]: Started sshd@158-139.178.89.23:22-121.11.103.144:56412.service. Feb 9 21:06:09.147049 sshd[2801]: Invalid user azhar from 42.51.37.190 port 35044 Feb 9 21:06:09.152961 sshd[2801]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:09.154101 sshd[2801]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:06:09.154189 sshd[2801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.37.190 Feb 9 21:06:09.155212 sshd[2801]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:09.782162 sshd[2804]: Invalid user shiv from 121.11.103.144 port 56412 Feb 9 21:06:09.788318 sshd[2804]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:09.789319 sshd[2804]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:06:09.789429 sshd[2804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.103.144 Feb 9 21:06:09.790415 sshd[2804]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:11.136284 systemd[1]: Started sshd@159-139.178.89.23:22-139.178.89.65:40202.service. Feb 9 21:06:11.170122 sshd[2807]: Accepted publickey for core from 139.178.89.65 port 40202 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:11.171027 sshd[2807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:11.174077 systemd-logind[1456]: New session 92 of user core. Feb 9 21:06:11.174691 systemd[1]: Started session-92.scope. Feb 9 21:06:11.229924 sshd[2807]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:11.231660 systemd[1]: sshd@159-139.178.89.23:22-139.178.89.65:40202.service: Deactivated successfully. Feb 9 21:06:11.231976 systemd[1]: session-92.scope: Deactivated successfully. Feb 9 21:06:11.232278 systemd-logind[1456]: Session 92 logged out. Waiting for processes to exit. Feb 9 21:06:11.232785 systemd[1]: Started sshd@160-139.178.89.23:22-139.178.89.65:40212.service. Feb 9 21:06:11.233174 systemd-logind[1456]: Removed session 92. Feb 9 21:06:11.266415 sshd[2813]: Accepted publickey for core from 139.178.89.65 port 40212 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:11.267203 sshd[2813]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:11.270018 systemd-logind[1456]: New session 93 of user core. Feb 9 21:06:11.270567 systemd[1]: Started session-93.scope. Feb 9 21:06:11.325874 sshd[2813]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:11.327091 systemd[1]: sshd@160-139.178.89.23:22-139.178.89.65:40212.service: Deactivated successfully. Feb 9 21:06:11.327488 systemd[1]: session-93.scope: Deactivated successfully. Feb 9 21:06:11.327924 systemd-logind[1456]: Session 93 logged out. Waiting for processes to exit. Feb 9 21:06:11.328341 systemd-logind[1456]: Removed session 93. Feb 9 21:06:11.388987 update_engine[1458]: I0209 21:06:11.388758 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:06:11.389666 update_engine[1458]: I0209 21:06:11.389153 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:06:11.389666 update_engine[1458]: E0209 21:06:11.389312 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:06:11.389666 update_engine[1458]: I0209 21:06:11.389477 1458 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 21:06:11.816099 sshd[2801]: Failed password for invalid user azhar from 42.51.37.190 port 35044 ssh2 Feb 9 21:06:12.451167 sshd[2804]: Failed password for invalid user shiv from 121.11.103.144 port 56412 ssh2 Feb 9 21:06:12.832987 sshd[2801]: Received disconnect from 42.51.37.190 port 35044:11: Bye Bye [preauth] Feb 9 21:06:12.832987 sshd[2801]: Disconnected from invalid user azhar 42.51.37.190 port 35044 [preauth] Feb 9 21:06:12.835515 systemd[1]: sshd@157-139.178.89.23:22-42.51.37.190:35044.service: Deactivated successfully. Feb 9 21:06:14.576222 sshd[2804]: Received disconnect from 121.11.103.144 port 56412:11: Bye Bye [preauth] Feb 9 21:06:14.576222 sshd[2804]: Disconnected from invalid user shiv 121.11.103.144 port 56412 [preauth] Feb 9 21:06:14.578871 systemd[1]: sshd@158-139.178.89.23:22-121.11.103.144:56412.service: Deactivated successfully. Feb 9 21:06:21.335984 systemd[1]: Started sshd@161-139.178.89.23:22-139.178.89.65:53570.service. Feb 9 21:06:21.369445 sshd[2821]: Accepted publickey for core from 139.178.89.65 port 53570 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:21.370073 sshd[2821]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:21.372356 systemd-logind[1456]: New session 94 of user core. Feb 9 21:06:21.372869 systemd[1]: Started session-94.scope. Feb 9 21:06:21.388809 update_engine[1458]: I0209 21:06:21.388765 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:06:21.388953 update_engine[1458]: I0209 21:06:21.388859 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:06:21.388953 update_engine[1458]: E0209 21:06:21.388906 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:06:21.388953 update_engine[1458]: I0209 21:06:21.388943 1458 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 21:06:21.425269 sshd[2821]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:21.427033 systemd[1]: sshd@161-139.178.89.23:22-139.178.89.65:53570.service: Deactivated successfully. Feb 9 21:06:21.427413 systemd[1]: session-94.scope: Deactivated successfully. Feb 9 21:06:21.427819 systemd-logind[1456]: Session 94 logged out. Waiting for processes to exit. Feb 9 21:06:21.428299 systemd[1]: Started sshd@162-139.178.89.23:22-139.178.89.65:53574.service. Feb 9 21:06:21.428715 systemd-logind[1456]: Removed session 94. Feb 9 21:06:21.461503 sshd[2827]: Accepted publickey for core from 139.178.89.65 port 53574 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:21.462410 sshd[2827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:21.465306 systemd-logind[1456]: New session 95 of user core. Feb 9 21:06:21.465958 systemd[1]: Started session-95.scope. Feb 9 21:06:21.530257 sshd[2827]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:21.535955 systemd[1]: sshd@162-139.178.89.23:22-139.178.89.65:53574.service: Deactivated successfully. Feb 9 21:06:21.537724 systemd[1]: session-95.scope: Deactivated successfully. Feb 9 21:06:21.539416 systemd-logind[1456]: Session 95 logged out. Waiting for processes to exit. Feb 9 21:06:21.541619 systemd-logind[1456]: Removed session 95. Feb 9 21:06:26.969467 systemd[1]: Started sshd@163-139.178.89.23:22-103.237.87.215:37738.service. Feb 9 21:06:28.109808 sshd[2833]: Invalid user shweta from 103.237.87.215 port 37738 Feb 9 21:06:28.115830 sshd[2833]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:28.116989 sshd[2833]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:06:28.117078 sshd[2833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.237.87.215 Feb 9 21:06:28.118093 sshd[2833]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:30.387308 sshd[2833]: Failed password for invalid user shweta from 103.237.87.215 port 37738 ssh2 Feb 9 21:06:30.690304 sshd[2833]: Received disconnect from 103.237.87.215 port 37738:11: Bye Bye [preauth] Feb 9 21:06:30.690304 sshd[2833]: Disconnected from invalid user shweta 103.237.87.215 port 37738 [preauth] Feb 9 21:06:30.692703 systemd[1]: sshd@163-139.178.89.23:22-103.237.87.215:37738.service: Deactivated successfully. Feb 9 21:06:31.399331 update_engine[1458]: I0209 21:06:31.399207 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:06:31.400169 update_engine[1458]: I0209 21:06:31.399703 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:06:31.400169 update_engine[1458]: E0209 21:06:31.399901 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:06:31.400169 update_engine[1458]: I0209 21:06:31.400059 1458 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 21:06:31.400169 update_engine[1458]: I0209 21:06:31.400074 1458 omaha_request_action.cc:621] Omaha request response: Feb 9 21:06:31.400606 update_engine[1458]: E0209 21:06:31.400215 1458 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 21:06:31.400606 update_engine[1458]: I0209 21:06:31.400242 1458 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 21:06:31.400606 update_engine[1458]: I0209 21:06:31.400254 1458 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:06:31.400606 update_engine[1458]: I0209 21:06:31.400261 1458 update_attempter.cc:306] Processing Done. Feb 9 21:06:31.400606 update_engine[1458]: E0209 21:06:31.400286 1458 update_attempter.cc:619] Update failed. Feb 9 21:06:31.400606 update_engine[1458]: I0209 21:06:31.400295 1458 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 21:06:31.400606 update_engine[1458]: I0209 21:06:31.400305 1458 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 21:06:31.400606 update_engine[1458]: I0209 21:06:31.400313 1458 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 21:06:31.400606 update_engine[1458]: I0209 21:06:31.400481 1458 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 21:06:31.400606 update_engine[1458]: I0209 21:06:31.400533 1458 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 21:06:31.400606 update_engine[1458]: I0209 21:06:31.400542 1458 omaha_request_action.cc:271] Request: <?xml version="1.0" encoding="UTF-8"?> Feb 9 21:06:31.400606 update_engine[1458]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1"> Feb 9 21:06:31.400606 update_engine[1458]: <os version="Chateau" platform="CoreOS" sp="3510.3.2_x86_64"></os> Feb 9 21:06:31.400606 update_engine[1458]: <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="3510.3.2" track="lts" bootid="{5d6646d7-39ce-4316-9840-1abf51b56b18}" oem="packet" oemversion="0.2.2" alephversion="3510.3.2" machineid="2afa3269441d444280311337f2bec5e3" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" > Feb 9 21:06:31.400606 update_engine[1458]: <event eventtype="3" eventresult="0" errorcode="268437456"></event> Feb 9 21:06:31.400606 update_engine[1458]: </app> Feb 9 21:06:31.400606 update_engine[1458]: </request> Feb 9 21:06:31.400606 update_engine[1458]: I0209 21:06:31.400552 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:06:31.402268 update_engine[1458]: I0209 21:06:31.400867 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:06:31.402268 update_engine[1458]: E0209 21:06:31.401026 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:06:31.402268 update_engine[1458]: I0209 21:06:31.401157 1458 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 21:06:31.402268 update_engine[1458]: I0209 21:06:31.401171 1458 omaha_request_action.cc:621] Omaha request response: Feb 9 21:06:31.402268 update_engine[1458]: I0209 21:06:31.401182 1458 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:06:31.402268 update_engine[1458]: I0209 21:06:31.401190 1458 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:06:31.402268 update_engine[1458]: I0209 21:06:31.401197 1458 update_attempter.cc:306] Processing Done. Feb 9 21:06:31.402268 update_engine[1458]: I0209 21:06:31.401206 1458 update_attempter.cc:310] Error event sent. Feb 9 21:06:31.402268 update_engine[1458]: I0209 21:06:31.401225 1458 update_check_scheduler.cc:74] Next update check in 42m33s Feb 9 21:06:31.403134 locksmithd[1497]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 21:06:31.403134 locksmithd[1497]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 21:06:31.538957 systemd[1]: Started sshd@164-139.178.89.23:22-139.178.89.65:34656.service. Feb 9 21:06:31.572196 sshd[2837]: Accepted publickey for core from 139.178.89.65 port 34656 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:31.573080 sshd[2837]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:31.576051 systemd-logind[1456]: New session 96 of user core. Feb 9 21:06:31.576636 systemd[1]: Started session-96.scope. Feb 9 21:06:31.630291 sshd[2837]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:31.631944 systemd[1]: sshd@164-139.178.89.23:22-139.178.89.65:34656.service: Deactivated successfully. Feb 9 21:06:31.632244 systemd[1]: session-96.scope: Deactivated successfully. Feb 9 21:06:31.632616 systemd-logind[1456]: Session 96 logged out. Waiting for processes to exit. Feb 9 21:06:31.633101 systemd[1]: Started sshd@165-139.178.89.23:22-139.178.89.65:34666.service. Feb 9 21:06:31.633515 systemd-logind[1456]: Removed session 96. Feb 9 21:06:31.666485 sshd[2843]: Accepted publickey for core from 139.178.89.65 port 34666 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:31.667366 sshd[2843]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:31.670310 systemd-logind[1456]: New session 97 of user core. Feb 9 21:06:31.670961 systemd[1]: Started session-97.scope. Feb 9 21:06:31.725111 sshd[2843]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:31.726261 systemd[1]: sshd@165-139.178.89.23:22-139.178.89.65:34666.service: Deactivated successfully. Feb 9 21:06:31.726656 systemd[1]: session-97.scope: Deactivated successfully. Feb 9 21:06:31.727079 systemd-logind[1456]: Session 97 logged out. Waiting for processes to exit. Feb 9 21:06:31.727713 systemd-logind[1456]: Removed session 97. Feb 9 21:06:32.414312 systemd[1]: Started sshd@166-139.178.89.23:22-175.139.200.245:49948.service. Feb 9 21:06:33.588132 sshd[2849]: Invalid user msramezandoost from 175.139.200.245 port 49948 Feb 9 21:06:33.594297 sshd[2849]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:33.595370 sshd[2849]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:06:33.595459 sshd[2849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.200.245 Feb 9 21:06:33.596370 sshd[2849]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:35.490304 systemd[1]: Started sshd@167-139.178.89.23:22-101.43.121.33:58042.service. Feb 9 21:06:35.884686 sshd[2849]: Failed password for invalid user msramezandoost from 175.139.200.245 port 49948 ssh2 Feb 9 21:06:36.341838 sshd[2852]: Invalid user shweta from 101.43.121.33 port 58042 Feb 9 21:06:36.348082 sshd[2852]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:36.349057 sshd[2852]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:06:36.349145 sshd[2852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:06:36.350169 sshd[2852]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:36.575524 sshd[2849]: Received disconnect from 175.139.200.245 port 49948:11: Bye Bye [preauth] Feb 9 21:06:36.575524 sshd[2849]: Disconnected from invalid user msramezandoost 175.139.200.245 port 49948 [preauth] Feb 9 21:06:36.578008 systemd[1]: sshd@166-139.178.89.23:22-175.139.200.245:49948.service: Deactivated successfully. Feb 9 21:06:38.383773 sshd[2852]: Failed password for invalid user shweta from 101.43.121.33 port 58042 ssh2 Feb 9 21:06:38.863804 sshd[2852]: Received disconnect from 101.43.121.33 port 58042:11: Bye Bye [preauth] Feb 9 21:06:38.863804 sshd[2852]: Disconnected from invalid user shweta 101.43.121.33 port 58042 [preauth] Feb 9 21:06:38.866384 systemd[1]: sshd@167-139.178.89.23:22-101.43.121.33:58042.service: Deactivated successfully. Feb 9 21:06:41.734476 systemd[1]: Started sshd@168-139.178.89.23:22-139.178.89.65:39814.service. Feb 9 21:06:41.768160 sshd[2857]: Accepted publickey for core from 139.178.89.65 port 39814 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:41.768836 sshd[2857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:41.771186 systemd-logind[1456]: New session 98 of user core. Feb 9 21:06:41.771662 systemd[1]: Started session-98.scope. Feb 9 21:06:41.824072 sshd[2857]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:41.825762 systemd[1]: sshd@168-139.178.89.23:22-139.178.89.65:39814.service: Deactivated successfully. Feb 9 21:06:41.826141 systemd[1]: session-98.scope: Deactivated successfully. Feb 9 21:06:41.826484 systemd-logind[1456]: Session 98 logged out. Waiting for processes to exit. Feb 9 21:06:41.826963 systemd[1]: Started sshd@169-139.178.89.23:22-139.178.89.65:39826.service. Feb 9 21:06:41.827314 systemd-logind[1456]: Removed session 98. Feb 9 21:06:41.860290 sshd[2863]: Accepted publickey for core from 139.178.89.65 port 39826 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:41.861195 sshd[2863]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:41.864192 systemd-logind[1456]: New session 99 of user core. Feb 9 21:06:41.864812 systemd[1]: Started session-99.scope. Feb 9 21:06:41.930244 sshd[2863]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:41.935942 systemd[1]: sshd@169-139.178.89.23:22-139.178.89.65:39826.service: Deactivated successfully. Feb 9 21:06:41.937730 systemd[1]: session-99.scope: Deactivated successfully. Feb 9 21:06:41.939432 systemd-logind[1456]: Session 99 logged out. Waiting for processes to exit. Feb 9 21:06:41.941664 systemd-logind[1456]: Removed session 99. Feb 9 21:06:47.646567 systemd[1]: Started sshd@170-139.178.89.23:22-192.241.153.100:45972.service. Feb 9 21:06:48.071316 sshd[2869]: Invalid user mnwork from 192.241.153.100 port 45972 Feb 9 21:06:48.077494 sshd[2869]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:48.078673 sshd[2869]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:06:48.078762 sshd[2869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 21:06:48.079683 sshd[2869]: pam_faillock(sshd:auth): User unknown Feb 9 21:06:49.761891 sshd[2869]: Failed password for invalid user mnwork from 192.241.153.100 port 45972 ssh2 Feb 9 21:06:51.147194 sshd[2869]: Received disconnect from 192.241.153.100 port 45972:11: Bye Bye [preauth] Feb 9 21:06:51.147194 sshd[2869]: Disconnected from invalid user mnwork 192.241.153.100 port 45972 [preauth] Feb 9 21:06:51.149804 systemd[1]: sshd@170-139.178.89.23:22-192.241.153.100:45972.service: Deactivated successfully. Feb 9 21:06:51.938653 systemd[1]: Started sshd@171-139.178.89.23:22-139.178.89.65:55440.service. Feb 9 21:06:51.972066 sshd[2874]: Accepted publickey for core from 139.178.89.65 port 55440 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:51.973001 sshd[2874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:51.975983 systemd-logind[1456]: New session 100 of user core. Feb 9 21:06:51.976592 systemd[1]: Started session-100.scope. Feb 9 21:06:52.029980 sshd[2874]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:52.031682 systemd[1]: sshd@171-139.178.89.23:22-139.178.89.65:55440.service: Deactivated successfully. Feb 9 21:06:52.031997 systemd[1]: session-100.scope: Deactivated successfully. Feb 9 21:06:52.032272 systemd-logind[1456]: Session 100 logged out. Waiting for processes to exit. Feb 9 21:06:52.032881 systemd[1]: Started sshd@172-139.178.89.23:22-139.178.89.65:55456.service. Feb 9 21:06:52.033238 systemd-logind[1456]: Removed session 100. Feb 9 21:06:52.066333 sshd[2880]: Accepted publickey for core from 139.178.89.65 port 55456 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:06:52.067237 sshd[2880]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:06:52.070195 systemd-logind[1456]: New session 101 of user core. Feb 9 21:06:52.070988 systemd[1]: Started session-101.scope. Feb 9 21:06:52.136183 sshd[2880]: pam_unix(sshd:session): session closed for user core Feb 9 21:06:52.141831 systemd[1]: sshd@172-139.178.89.23:22-139.178.89.65:55456.service: Deactivated successfully. Feb 9 21:06:52.143622 systemd[1]: session-101.scope: Deactivated successfully. Feb 9 21:06:52.145316 systemd-logind[1456]: Session 101 logged out. Waiting for processes to exit. Feb 9 21:06:52.147537 systemd-logind[1456]: Removed session 101. Feb 9 21:07:02.145599 systemd[1]: Started sshd@173-139.178.89.23:22-139.178.89.65:57332.service. Feb 9 21:07:02.179179 sshd[2886]: Accepted publickey for core from 139.178.89.65 port 57332 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:02.179881 sshd[2886]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:02.182219 systemd-logind[1456]: New session 102 of user core. Feb 9 21:07:02.182650 systemd[1]: Started session-102.scope. Feb 9 21:07:02.234546 sshd[2886]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:02.236233 systemd[1]: sshd@173-139.178.89.23:22-139.178.89.65:57332.service: Deactivated successfully. Feb 9 21:07:02.236536 systemd[1]: session-102.scope: Deactivated successfully. Feb 9 21:07:02.236929 systemd-logind[1456]: Session 102 logged out. Waiting for processes to exit. Feb 9 21:07:02.237390 systemd[1]: Started sshd@174-139.178.89.23:22-139.178.89.65:57334.service. Feb 9 21:07:02.237811 systemd-logind[1456]: Removed session 102. Feb 9 21:07:02.271072 sshd[2892]: Accepted publickey for core from 139.178.89.65 port 57334 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:02.271716 sshd[2892]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:02.274025 systemd-logind[1456]: New session 103 of user core. Feb 9 21:07:02.274466 systemd[1]: Started session-103.scope. Feb 9 21:07:02.327693 sshd[2892]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:02.330442 systemd[1]: sshd@174-139.178.89.23:22-139.178.89.65:57334.service: Deactivated successfully. Feb 9 21:07:02.331317 systemd[1]: session-103.scope: Deactivated successfully. Feb 9 21:07:02.332205 systemd-logind[1456]: Session 103 logged out. Waiting for processes to exit. Feb 9 21:07:02.333428 systemd-logind[1456]: Removed session 103. Feb 9 21:07:04.432734 systemd[1]: Started sshd@175-139.178.89.23:22-43.153.207.95:36074.service. Feb 9 21:07:05.445277 sshd[2899]: Invalid user nafas from 43.153.207.95 port 36074 Feb 9 21:07:05.451515 sshd[2899]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:05.452532 sshd[2899]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:05.452618 sshd[2899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.207.95 Feb 9 21:07:05.453614 sshd[2899]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:06.855201 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.854Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"1f1e3e590b92487a"} Feb 9 21:07:06.855201 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.854Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3} Feb 9 21:07:06.874898 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.874Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"967872570d3885c9","cluster-id":"a33df597fd260499"} Feb 9 21:07:06.874898 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.874Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 switched to configuration voters=()"} Feb 9 21:07:06.874898 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.874Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became follower at term 0"} Feb 9 21:07:06.874898 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.874Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 967872570d3885c9 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 9 21:07:06.874898 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.874Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became follower at term 1"} Feb 9 21:07:06.875813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.874Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 switched to configuration voters=(2242298216644233338)"} Feb 9 21:07:06.875813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.874Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 switched to configuration voters=(2242298216644233338 6465635896095148693)"} Feb 9 21:07:06.875813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.874Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 switched to configuration voters=(2242298216644233338 6465635896095148693 10842541821103998409)"} Feb 9 21:07:06.876211 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:06.875Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 9 21:07:06.878736 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.878Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 9 21:07:06.879846 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.879Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 9 21:07:06.880482 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.880Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"1f1e3e590b92487a"} Feb 9 21:07:06.880482 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.880Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"967872570d3885c9","remote-peer-id":"1f1e3e590b92487a"} Feb 9 21:07:06.881182 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.880Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"967872570d3885c9","remote-peer-id":"1f1e3e590b92487a"} Feb 9 21:07:06.881445 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.880Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"967872570d3885c9","remote-peer-id":"1f1e3e590b92487a"} Feb 9 21:07:06.882023 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.881Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"1f1e3e590b92487a"} Feb 9 21:07:06.882023 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.881Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"967872570d3885c9","remote-peer-id":"1f1e3e590b92487a","remote-peer-urls":["http://10.67.80.15:2380"]} Feb 9 21:07:06.882023 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.881Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.882023 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.881Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"967872570d3885c9","remote-peer-id":"1f1e3e590b92487a"} Feb 9 21:07:06.882023 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.881Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"967872570d3885c9","remote-peer-id":"1f1e3e590b92487a"} Feb 9 21:07:06.882935 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.881Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"967872570d3885c9","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.883912 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.883Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"967872570d3885c9","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.884650 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.884Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"967872570d3885c9","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.886160 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.885Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.886160 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.885Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"967872570d3885c9","remote-peer-id":"59ba8d9751c40a95","remote-peer-urls":["http://10.67.80.13:2380"]} Feb 9 21:07:06.886160 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.885Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"967872570d3885c9","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.886160 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.885Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"967872570d3885c9","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 9 21:07:06.886160 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.885Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"967872570d3885c9","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.887067 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.886Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Feb 9 21:07:06.887264 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.886Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 switched to configuration voters=(2242298216644233338 6465635896095148693 10842541821103998409)"} Feb 9 21:07:06.887472 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.887Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a33df597fd260499","local-member-id":"967872570d3885c9","added-peer-id":"1f1e3e590b92487a","added-peer-peer-urls":["http://10.67.80.15:2380"]} Feb 9 21:07:06.887765 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.887Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 switched to configuration voters=(2242298216644233338 6465635896095148693 10842541821103998409)"} Feb 9 21:07:06.887998 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.887Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a33df597fd260499","local-member-id":"967872570d3885c9","added-peer-id":"59ba8d9751c40a95","added-peer-peer-urls":["http://10.67.80.13:2380"]} Feb 9 21:07:06.888163 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.887Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 switched to configuration voters=(2242298216644233338 6465635896095148693 10842541821103998409)"} Feb 9 21:07:06.888163 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.887Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a33df597fd260499","local-member-id":"967872570d3885c9","added-peer-id":"967872570d3885c9","added-peer-peer-urls":["http://10.67.80.17:2380"]} Feb 9 21:07:06.889286 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:06.889Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Feb 9 21:07:06.889319 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.889Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"967872570d3885c9","initial-advertise-peer-urls":["http://10.67.80.17:2380"],"listen-peer-urls":["http://10.67.80.17:2380"],"advertise-client-urls":["http://10.67.80.17:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 9 21:07:06.889356 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.889Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.17:2380"} Feb 9 21:07:06.889356 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:06.889Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.17:2380"} Feb 9 21:07:07.135985 sshd[2899]: Failed password for invalid user nafas from 43.153.207.95 port 36074 ssh2 Feb 9 21:07:07.158606 systemd[1]: Started sshd@176-139.178.89.23:22-101.43.121.33:38548.service. Feb 9 21:07:07.852313 systemd[1]: Started sshd@177-139.178.89.23:22-42.51.37.190:55858.service. Feb 9 21:07:07.991958 sshd[2902]: Invalid user rgonzalez from 101.43.121.33 port 38548 Feb 9 21:07:07.998057 sshd[2902]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:07.999190 sshd[2902]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:07.999278 sshd[2902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:07:08.000249 sshd[2902]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:08.204618 sshd[2899]: Received disconnect from 43.153.207.95 port 36074:11: Bye Bye [preauth] Feb 9 21:07:08.204618 sshd[2899]: Disconnected from invalid user nafas 43.153.207.95 port 36074 [preauth] Feb 9 21:07:08.207197 systemd[1]: sshd@175-139.178.89.23:22-43.153.207.95:36074.service: Deactivated successfully. Feb 9 21:07:08.376737 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:08.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:08.376737 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:08.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:08.376737 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:08.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:08.376737 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:08.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:08.376737 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:08.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:08.810412 sshd[2905]: Invalid user atena from 42.51.37.190 port 55858 Feb 9 21:07:08.816484 sshd[2905]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:08.817493 sshd[2905]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:08.817582 sshd[2905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.37.190 Feb 9 21:07:08.818488 sshd[2905]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:09.876466 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:09.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:09.876466 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:09.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:09.876466 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:09.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:09.876466 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:09.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:09.876466 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:09.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:10.289767 sshd[2902]: Failed password for invalid user rgonzalez from 101.43.121.33 port 38548 ssh2 Feb 9 21:07:10.911718 sshd[2905]: Failed password for invalid user atena from 42.51.37.190 port 55858 ssh2 Feb 9 21:07:11.375820 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:11.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:11.375820 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:11.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:11.375820 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:11.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:11.375820 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:11.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:11.375820 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:11.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:11.882404 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:11.881Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s"} Feb 9 21:07:11.882404 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:11.881Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s"} Feb 9 21:07:11.899789 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:11.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s"} Feb 9 21:07:11.899789 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:11.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s"} Feb 9 21:07:12.054823 sshd[2902]: Received disconnect from 101.43.121.33 port 38548:11: Bye Bye [preauth] Feb 9 21:07:12.054823 sshd[2902]: Disconnected from invalid user rgonzalez 101.43.121.33 port 38548 [preauth] Feb 9 21:07:12.057282 systemd[1]: sshd@176-139.178.89.23:22-101.43.121.33:38548.service: Deactivated successfully. Feb 9 21:07:12.336731 systemd[1]: Started sshd@178-139.178.89.23:22-139.178.89.65:43470.service. Feb 9 21:07:12.370116 sshd[2910]: Accepted publickey for core from 139.178.89.65 port 43470 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:12.371001 sshd[2910]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:12.374112 systemd-logind[1456]: New session 104 of user core. Feb 9 21:07:12.374847 systemd[1]: Started session-104.scope. Feb 9 21:07:12.428503 sshd[2910]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:12.430163 systemd[1]: sshd@178-139.178.89.23:22-139.178.89.65:43470.service: Deactivated successfully. Feb 9 21:07:12.430511 systemd[1]: session-104.scope: Deactivated successfully. Feb 9 21:07:12.430854 systemd-logind[1456]: Session 104 logged out. Waiting for processes to exit. Feb 9 21:07:12.431424 systemd[1]: Started sshd@179-139.178.89.23:22-139.178.89.65:43478.service. Feb 9 21:07:12.431876 systemd-logind[1456]: Removed session 104. Feb 9 21:07:12.465061 sshd[2916]: Accepted publickey for core from 139.178.89.65 port 43478 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:12.465979 sshd[2916]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:12.469140 systemd-logind[1456]: New session 105 of user core. Feb 9 21:07:12.469960 systemd[1]: Started session-105.scope. Feb 9 21:07:12.535380 sshd[2916]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:12.540989 systemd[1]: sshd@179-139.178.89.23:22-139.178.89.65:43478.service: Deactivated successfully. Feb 9 21:07:12.542767 systemd[1]: session-105.scope: Deactivated successfully. Feb 9 21:07:12.544471 systemd-logind[1456]: Session 105 logged out. Waiting for processes to exit. Feb 9 21:07:12.546649 systemd-logind[1456]: Removed session 105. Feb 9 21:07:12.862704 sshd[2905]: Received disconnect from 42.51.37.190 port 55858:11: Bye Bye [preauth] Feb 9 21:07:12.862704 sshd[2905]: Disconnected from invalid user atena 42.51.37.190 port 55858 [preauth] Feb 9 21:07:12.865256 systemd[1]: sshd@177-139.178.89.23:22-42.51.37.190:55858.service: Deactivated successfully. Feb 9 21:07:12.876071 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:12.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:12.876071 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:12.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:12.876071 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:12.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:12.876071 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:12.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:12.876071 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:12.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:13.887200 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:13.886Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:07:14.376480 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:14.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:14.376480 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:14.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:14.376480 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:14.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:14.376480 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:14.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:14.376480 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:14.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:15.876786 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:15.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:15.876786 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:15.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:15.876786 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:15.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:15.876786 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:15.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:15.876786 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:15.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:16.883308 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:16.882Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:16.883308 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:16.882Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:16.887540 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:16.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:16.887540 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:16.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:17.376132 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:17.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:17.376132 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:17.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:17.376132 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:17.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:17.376132 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:17.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:17.376132 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:17.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:18.876131 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:18.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:18.876131 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:18.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:18.876131 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:18.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:18.876131 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:18.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:18.876131 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:18.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:20.375802 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:20.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:20.375802 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:20.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:20.375802 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:20.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:20.375802 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:20.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:20.375802 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:20.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:20.887878 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:20.887Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:07:21.876550 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:21.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:21.876550 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:21.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:21.876550 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:21.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:21.876550 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:21.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:21.876550 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:21.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:21.884458 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:21.883Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:21.884458 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:21.883Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:21.888898 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:21.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:21.888898 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:21.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:22.543655 systemd[1]: Started sshd@180-139.178.89.23:22-139.178.89.65:39138.service. Feb 9 21:07:22.576910 sshd[2923]: Accepted publickey for core from 139.178.89.65 port 39138 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:22.577572 sshd[2923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:22.579933 systemd-logind[1456]: New session 106 of user core. Feb 9 21:07:22.580467 systemd[1]: Started session-106.scope. Feb 9 21:07:22.632978 sshd[2923]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:22.634674 systemd[1]: sshd@180-139.178.89.23:22-139.178.89.65:39138.service: Deactivated successfully. Feb 9 21:07:22.634990 systemd[1]: session-106.scope: Deactivated successfully. Feb 9 21:07:22.635264 systemd-logind[1456]: Session 106 logged out. Waiting for processes to exit. Feb 9 21:07:22.635875 systemd[1]: Started sshd@181-139.178.89.23:22-139.178.89.65:39140.service. Feb 9 21:07:22.636234 systemd-logind[1456]: Removed session 106. Feb 9 21:07:22.669046 sshd[2929]: Accepted publickey for core from 139.178.89.65 port 39140 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:22.669969 sshd[2929]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:22.673082 systemd-logind[1456]: New session 107 of user core. Feb 9 21:07:22.673882 systemd[1]: Started session-107.scope. Feb 9 21:07:22.739780 sshd[2929]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:22.745426 systemd[1]: sshd@181-139.178.89.23:22-139.178.89.65:39140.service: Deactivated successfully. Feb 9 21:07:22.747199 systemd[1]: session-107.scope: Deactivated successfully. Feb 9 21:07:22.748869 systemd-logind[1456]: Session 107 logged out. Waiting for processes to exit. Feb 9 21:07:22.751187 systemd-logind[1456]: Removed session 107. Feb 9 21:07:23.375958 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:23.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:23.375958 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:23.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:23.375958 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:23.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:23.375958 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:23.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:23.375958 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:23.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:24.875926 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:24.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:24.875926 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:24.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:24.875926 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:24.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:24.875926 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:24.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:24.875926 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:24.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:26.376255 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:26.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:26.376255 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:26.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:26.376255 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:26.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:26.376255 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:26.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:26.376255 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:26.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:26.884947 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:26.884Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:26.884947 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:26.884Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:26.889555 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:26.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:26.889555 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:26.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:27.876023 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:27.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:27.876023 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:27.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:27.876023 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:27.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:27.876023 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:27.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:27.876023 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:27.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:27.888632 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:27.888Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:07:29.376595 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:29.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:29.376595 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:29.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:29.376595 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:29.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:29.376595 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:29.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:29.376595 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:29.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:29.837623 systemd[1]: Started sshd@182-139.178.89.23:22-121.11.103.144:46516.service. Feb 9 21:07:30.760377 sshd[2936]: Invalid user joti from 121.11.103.144 port 46516 Feb 9 21:07:30.766403 sshd[2936]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:30.767445 sshd[2936]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:30.767531 sshd[2936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.103.144 Feb 9 21:07:30.768497 sshd[2936]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:30.875805 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:30.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:30.875805 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:30.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:30.875805 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:30.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:30.875805 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:30.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:30.875805 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:30.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:30.880487 systemd[1]: Started sshd@183-139.178.89.23:22-218.92.0.31:37584.service. Feb 9 21:07:31.879141 sshd[2939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:07:31.885236 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:31.884Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:31.885236 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:31.884Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:31.890595 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:31.890Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:31.890595 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:31.890Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:32.376881 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:32.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:32.376881 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:32.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:32.376881 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:32.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:32.376881 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:32.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:32.376881 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:32.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:32.748549 systemd[1]: Started sshd@184-139.178.89.23:22-139.178.89.65:37536.service. Feb 9 21:07:32.781630 sshd[2942]: Accepted publickey for core from 139.178.89.65 port 37536 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:32.782500 sshd[2942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:32.785287 systemd-logind[1456]: New session 108 of user core. Feb 9 21:07:32.786066 systemd[1]: Started session-108.scope. Feb 9 21:07:32.839911 sshd[2942]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:32.841717 systemd[1]: sshd@184-139.178.89.23:22-139.178.89.65:37536.service: Deactivated successfully. Feb 9 21:07:32.842042 systemd[1]: session-108.scope: Deactivated successfully. Feb 9 21:07:32.842325 systemd-logind[1456]: Session 108 logged out. Waiting for processes to exit. Feb 9 21:07:32.842934 systemd[1]: Started sshd@185-139.178.89.23:22-139.178.89.65:37540.service. Feb 9 21:07:32.843287 systemd-logind[1456]: Removed session 108. Feb 9 21:07:32.876040 sshd[2948]: Accepted publickey for core from 139.178.89.65 port 37540 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:32.876945 sshd[2948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:32.880077 systemd-logind[1456]: New session 109 of user core. Feb 9 21:07:32.880834 systemd[1]: Started session-109.scope. Feb 9 21:07:32.881419 sshd[2936]: Failed password for invalid user joti from 121.11.103.144 port 46516 ssh2 Feb 9 21:07:32.935126 sshd[2948]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:32.936308 systemd[1]: sshd@185-139.178.89.23:22-139.178.89.65:37540.service: Deactivated successfully. Feb 9 21:07:32.936718 systemd[1]: session-109.scope: Deactivated successfully. Feb 9 21:07:32.937046 systemd-logind[1456]: Session 109 logged out. Waiting for processes to exit. Feb 9 21:07:32.937483 systemd-logind[1456]: Removed session 109. Feb 9 21:07:33.630772 systemd[1]: Started sshd@186-139.178.89.23:22-103.237.87.215:57014.service. Feb 9 21:07:33.797403 sshd[2939]: Failed password for root from 218.92.0.31 port 37584 ssh2 Feb 9 21:07:33.875941 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:33.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:33.875941 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:33.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:33.875941 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:33.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:33.875941 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:33.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:33.875941 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:33.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:34.615872 sshd[2936]: Received disconnect from 121.11.103.144 port 46516:11: Bye Bye [preauth] Feb 9 21:07:34.615872 sshd[2936]: Disconnected from invalid user joti 121.11.103.144 port 46516 [preauth] Feb 9 21:07:34.618335 systemd[1]: sshd@182-139.178.89.23:22-121.11.103.144:46516.service: Deactivated successfully. Feb 9 21:07:34.798004 sshd[2954]: Invalid user niloofarrad from 103.237.87.215 port 57014 Feb 9 21:07:34.804060 sshd[2954]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:34.805162 sshd[2954]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:34.805246 sshd[2954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.237.87.215 Feb 9 21:07:34.806165 sshd[2954]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:34.889685 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:34.888Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:07:35.375926 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:35.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:35.375926 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:35.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:35.375926 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:35.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:35.375926 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:35.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:35.375926 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:35.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:36.002704 sshd[2939]: Failed password for root from 218.92.0.31 port 37584 ssh2 Feb 9 21:07:36.804399 sshd[2954]: Failed password for invalid user niloofarrad from 103.237.87.215 port 57014 ssh2 Feb 9 21:07:36.875998 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:36.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:36.875998 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:36.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:36.875998 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:36.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:36.875998 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:36.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:36.875998 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:36.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:36.885803 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:36.885Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:36.885803 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:36.885Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:36.891427 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:36.891Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:36.891427 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:36.891Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:38.376716 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:38.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:38.376716 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:38.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:38.376716 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:38.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:38.376716 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:38.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:38.376716 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:38.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:38.659049 systemd[1]: Started sshd@187-139.178.89.23:22-175.139.200.245:60992.service. Feb 9 21:07:38.962143 sshd[2954]: Received disconnect from 103.237.87.215 port 57014:11: Bye Bye [preauth] Feb 9 21:07:38.962143 sshd[2954]: Disconnected from invalid user niloofarrad 103.237.87.215 port 57014 [preauth] Feb 9 21:07:38.964498 systemd[1]: sshd@186-139.178.89.23:22-103.237.87.215:57014.service: Deactivated successfully. Feb 9 21:07:39.830977 sshd[2958]: Invalid user marjanamin from 175.139.200.245 port 60992 Feb 9 21:07:39.836992 sshd[2958]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:39.838036 sshd[2958]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:39.838125 sshd[2958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.200.245 Feb 9 21:07:39.839101 sshd[2958]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:39.876764 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:39.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:39.876764 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:39.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:39.876764 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:39.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:39.876764 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:39.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:39.876764 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:39.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:39.985188 sshd[2939]: Failed password for root from 218.92.0.31 port 37584 ssh2 Feb 9 21:07:40.198349 systemd[1]: Started sshd@188-139.178.89.23:22-101.43.121.33:47338.service. Feb 9 21:07:40.231656 sshd[2939]: Received disconnect from 218.92.0.31 port 37584:11: [preauth] Feb 9 21:07:40.231656 sshd[2939]: Disconnected from authenticating user root 218.92.0.31 port 37584 [preauth] Feb 9 21:07:40.231865 sshd[2939]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:07:40.232607 systemd[1]: sshd@183-139.178.89.23:22-218.92.0.31:37584.service: Deactivated successfully. Feb 9 21:07:40.383396 systemd[1]: Started sshd@189-139.178.89.23:22-218.92.0.31:30971.service. Feb 9 21:07:41.094778 sshd[2962]: Invalid user wojtek from 101.43.121.33 port 47338 Feb 9 21:07:41.100848 sshd[2962]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:41.101924 sshd[2962]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:41.102010 sshd[2962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:07:41.102941 sshd[2962]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:41.367607 sshd[2966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:07:41.376498 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:41.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:41.376498 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:41.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:41.376498 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:41.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:41.376498 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:41.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:41.376498 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:41.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:41.521391 sshd[2958]: Failed password for invalid user marjanamin from 175.139.200.245 port 60992 ssh2 Feb 9 21:07:41.886348 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:41.885Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:41.886348 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:41.885Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:41.889734 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:41.889Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:07:41.891988 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:41.891Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:41.891988 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:41.891Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:42.700348 systemd[1]: Started sshd@190-139.178.89.23:22-192.241.153.100:45168.service. Feb 9 21:07:42.876472 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:42.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:42.876472 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:42.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:42.876472 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:42.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:42.876472 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:42.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:42.876472 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:42.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:42.940894 systemd[1]: Started sshd@191-139.178.89.23:22-139.178.89.65:42420.service. Feb 9 21:07:42.978521 sshd[2972]: Accepted publickey for core from 139.178.89.65 port 42420 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:42.979378 sshd[2972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:42.982007 systemd-logind[1456]: New session 110 of user core. Feb 9 21:07:42.982734 systemd[1]: Started session-110.scope. Feb 9 21:07:43.047111 sshd[2972]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:43.054235 systemd[1]: sshd@191-139.178.89.23:22-139.178.89.65:42420.service: Deactivated successfully. Feb 9 21:07:43.055960 systemd[1]: session-110.scope: Deactivated successfully. Feb 9 21:07:43.057558 systemd-logind[1456]: Session 110 logged out. Waiting for processes to exit. Feb 9 21:07:43.060662 systemd[1]: Started sshd@192-139.178.89.23:22-139.178.89.65:42422.service. Feb 9 21:07:43.063179 systemd-logind[1456]: Removed session 110. Feb 9 21:07:43.097505 sshd[2979]: Accepted publickey for core from 139.178.89.65 port 42422 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:43.098227 sshd[2979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:43.100793 systemd-logind[1456]: New session 111 of user core. Feb 9 21:07:43.101391 systemd[1]: Started session-111.scope. Feb 9 21:07:43.105997 sshd[2958]: Received disconnect from 175.139.200.245 port 60992:11: Bye Bye [preauth] Feb 9 21:07:43.105997 sshd[2958]: Disconnected from invalid user marjanamin 175.139.200.245 port 60992 [preauth] Feb 9 21:07:43.106515 systemd[1]: sshd@187-139.178.89.23:22-175.139.200.245:60992.service: Deactivated successfully. Feb 9 21:07:43.120851 sshd[2969]: Invalid user afgha from 192.241.153.100 port 45168 Feb 9 21:07:43.126284 sshd[2969]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:43.127226 sshd[2969]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:43.127303 sshd[2969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 21:07:43.128205 sshd[2969]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:43.149910 sshd[2979]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:43.151089 systemd[1]: sshd@192-139.178.89.23:22-139.178.89.65:42422.service: Deactivated successfully. Feb 9 21:07:43.151458 systemd[1]: session-111.scope: Deactivated successfully. Feb 9 21:07:43.151846 systemd-logind[1456]: Session 111 logged out. Waiting for processes to exit. Feb 9 21:07:43.152283 systemd-logind[1456]: Removed session 111. Feb 9 21:07:43.392398 sshd[2962]: Failed password for invalid user wojtek from 101.43.121.33 port 47338 ssh2 Feb 9 21:07:43.657316 sshd[2966]: Failed password for root from 218.92.0.31 port 30971 ssh2 Feb 9 21:07:44.376511 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:44.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:44.376511 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:44.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:44.376511 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:44.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:44.376511 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:44.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:44.376511 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:44.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:44.694983 sshd[2969]: Failed password for invalid user afgha from 192.241.153.100 port 45168 ssh2 Feb 9 21:07:44.928153 sshd[2969]: Received disconnect from 192.241.153.100 port 45168:11: Bye Bye [preauth] Feb 9 21:07:44.928153 sshd[2969]: Disconnected from invalid user afgha 192.241.153.100 port 45168 [preauth] Feb 9 21:07:44.930722 systemd[1]: sshd@190-139.178.89.23:22-192.241.153.100:45168.service: Deactivated successfully. Feb 9 21:07:45.447519 sshd[2962]: Received disconnect from 101.43.121.33 port 47338:11: Bye Bye [preauth] Feb 9 21:07:45.447519 sshd[2962]: Disconnected from invalid user wojtek 101.43.121.33 port 47338 [preauth] Feb 9 21:07:45.450023 systemd[1]: sshd@188-139.178.89.23:22-101.43.121.33:47338.service: Deactivated successfully. Feb 9 21:07:45.464715 sshd[2966]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:07:45.876393 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:45.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:45.876393 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:45.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:45.876393 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:45.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:45.876393 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:45.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:45.876393 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:45.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:46.887236 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:46.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:46.887236 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:46.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:46.893179 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:46.892Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:46.893179 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:46.892Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:47.376797 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:47.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:47.376797 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:47.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:47.376797 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:47.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:47.376797 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:47.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:47.376797 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:47.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:47.638689 sshd[2966]: Failed password for root from 218.92.0.31 port 30971 ssh2 Feb 9 21:07:48.876296 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:48.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:48.876296 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:48.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:48.876296 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:48.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:48.876296 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:48.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:48.876296 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:48.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:48.890173 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:48.889Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:07:50.376392 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:50.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:50.376392 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:50.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:50.376392 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:50.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:50.376392 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:50.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:50.376392 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:50.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:51.285293 sshd[2966]: Failed password for root from 218.92.0.31 port 30971 ssh2 Feb 9 21:07:51.684772 sshd[2966]: Received disconnect from 218.92.0.31 port 30971:11: [preauth] Feb 9 21:07:51.684772 sshd[2966]: Disconnected from authenticating user root 218.92.0.31 port 30971 [preauth] Feb 9 21:07:51.685205 sshd[2966]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:07:51.687274 systemd[1]: sshd@189-139.178.89.23:22-218.92.0.31:30971.service: Deactivated successfully. Feb 9 21:07:51.853646 systemd[1]: Started sshd@193-139.178.89.23:22-218.92.0.31:35604.service. Feb 9 21:07:51.876167 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:51.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:51.876167 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:51.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:51.876167 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:51.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:51.876167 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:51.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:51.876167 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:51.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:51.887332 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:51.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:51.887332 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:51.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:51.893829 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:51.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:51.893829 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:51.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:53.158844 systemd[1]: Started sshd@194-139.178.89.23:22-139.178.89.65:46670.service. Feb 9 21:07:53.191872 sshd[2996]: Accepted publickey for core from 139.178.89.65 port 46670 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:53.192770 sshd[2996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:53.196110 systemd-logind[1456]: New session 112 of user core. Feb 9 21:07:53.196867 systemd[1]: Started session-112.scope. Feb 9 21:07:53.251470 sshd[2996]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:53.253191 systemd[1]: sshd@194-139.178.89.23:22-139.178.89.65:46670.service: Deactivated successfully. Feb 9 21:07:53.253532 systemd[1]: session-112.scope: Deactivated successfully. Feb 9 21:07:53.253900 systemd-logind[1456]: Session 112 logged out. Waiting for processes to exit. Feb 9 21:07:53.254483 systemd[1]: Started sshd@195-139.178.89.23:22-139.178.89.65:46678.service. Feb 9 21:07:53.254875 systemd-logind[1456]: Removed session 112. Feb 9 21:07:53.287912 sshd[3002]: Accepted publickey for core from 139.178.89.65 port 46678 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:53.288548 sshd[3002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:53.290731 systemd-logind[1456]: New session 113 of user core. Feb 9 21:07:53.291256 systemd[1]: Started session-113.scope. Feb 9 21:07:53.344453 sshd[3002]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:53.347626 systemd[1]: sshd@195-139.178.89.23:22-139.178.89.65:46678.service: Deactivated successfully. Feb 9 21:07:53.348913 systemd[1]: session-113.scope: Deactivated successfully. Feb 9 21:07:53.350056 systemd-logind[1456]: Session 113 logged out. Waiting for processes to exit. Feb 9 21:07:53.351585 systemd-logind[1456]: Removed session 113. Feb 9 21:07:53.376665 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:53.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:53.376665 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:53.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:53.376665 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:53.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:53.376665 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:53.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:53.376665 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:53.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:53.737907 sshd[2993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:07:54.876721 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:54.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:54.876721 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:54.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:54.876721 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:54.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:54.876721 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:54.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:54.876721 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:54.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:55.676184 sshd[2993]: Failed password for root from 218.92.0.31 port 35604 ssh2 Feb 9 21:07:55.890495 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:55.889Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:07:56.375804 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:56.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:56.375804 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:56.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:56.375804 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:56.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:56.375804 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:56.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:56.375804 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:56.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:56.888396 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:56.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:56.888396 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:56.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:07:56.894651 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:56.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:56.894651 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:07:56.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:07:57.412891 sshd[2993]: Failed password for root from 218.92.0.31 port 35604 ssh2 Feb 9 21:07:57.875803 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:57.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:57.875803 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:57.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:57.875803 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:57.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:57.875803 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:57.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:57.875803 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:57.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:07:59.376931 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:59.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:07:59.376931 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:59.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:07:59.376931 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:59.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:07:59.376931 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:59.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:07:59.376931 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:07:59.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:00.148723 sshd[2993]: Failed password for root from 218.92.0.31 port 35604 ssh2 Feb 9 21:08:00.876315 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:00.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:00.876315 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:00.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:00.876315 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:00.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:00.876315 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:00.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:00.876315 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:00.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:01.888850 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:01.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:01.888850 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:01.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:01.895188 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:01.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:01.895188 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:01.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:02.098020 sshd[2993]: Received disconnect from 218.92.0.31 port 35604:11: [preauth] Feb 9 21:08:02.098020 sshd[2993]: Disconnected from authenticating user root 218.92.0.31 port 35604 [preauth] Feb 9 21:08:02.098611 sshd[2993]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:08:02.100649 systemd[1]: sshd@193-139.178.89.23:22-218.92.0.31:35604.service: Deactivated successfully. Feb 9 21:08:02.376813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:02.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:02.376813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:02.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:02.376813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:02.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:02.376813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:02.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:02.376813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:02.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:02.891254 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:02.890Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:08:03.353214 systemd[1]: Started sshd@196-139.178.89.23:22-139.178.89.65:48678.service. Feb 9 21:08:03.386511 sshd[3009]: Accepted publickey for core from 139.178.89.65 port 48678 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:08:03.387313 sshd[3009]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:08:03.390030 systemd-logind[1456]: New session 114 of user core. Feb 9 21:08:03.390635 systemd[1]: Started session-114.scope. Feb 9 21:08:03.445138 sshd[3009]: pam_unix(sshd:session): session closed for user core Feb 9 21:08:03.446773 systemd[1]: sshd@196-139.178.89.23:22-139.178.89.65:48678.service: Deactivated successfully. Feb 9 21:08:03.447097 systemd[1]: session-114.scope: Deactivated successfully. Feb 9 21:08:03.447391 systemd-logind[1456]: Session 114 logged out. Waiting for processes to exit. Feb 9 21:08:03.447914 systemd[1]: Started sshd@197-139.178.89.23:22-139.178.89.65:48686.service. Feb 9 21:08:03.448315 systemd-logind[1456]: Removed session 114. Feb 9 21:08:03.481064 sshd[3015]: Accepted publickey for core from 139.178.89.65 port 48686 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:08:03.481876 sshd[3015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:08:03.484760 systemd-logind[1456]: New session 115 of user core. Feb 9 21:08:03.485322 systemd[1]: Started session-115.scope. Feb 9 21:08:03.547938 sshd[3015]: pam_unix(sshd:session): session closed for user core Feb 9 21:08:03.552995 systemd[1]: sshd@197-139.178.89.23:22-139.178.89.65:48686.service: Deactivated successfully. Feb 9 21:08:03.554661 systemd[1]: session-115.scope: Deactivated successfully. Feb 9 21:08:03.556320 systemd-logind[1456]: Session 115 logged out. Waiting for processes to exit. Feb 9 21:08:03.558444 systemd-logind[1456]: Removed session 115. Feb 9 21:08:03.876875 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:03.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:03.876875 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:03.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:03.876875 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:03.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:03.876875 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:03.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:03.876875 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:03.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:05.376404 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:05.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:05.376404 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:05.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:05.376404 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:05.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:05.376404 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:05.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:05.376404 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:05.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:05.427133 systemd[1]: Started sshd@198-139.178.89.23:22-42.51.37.190:48698.service. Feb 9 21:08:06.440947 sshd[3021]: Invalid user taaaghi from 42.51.37.190 port 48698 Feb 9 21:08:06.447112 sshd[3021]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:06.448162 sshd[3021]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:08:06.448250 sshd[3021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.37.190 Feb 9 21:08:06.449203 sshd[3021]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:06.876461 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:06.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:06.876461 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:06.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:06.876461 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:06.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:06.876461 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:06.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:06.876461 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:06.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:06.890017 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:06.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:06.890017 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:06.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:06.895736 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:06.895Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:06.895736 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:06.895Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:08.171735 sshd[3021]: Failed password for invalid user taaaghi from 42.51.37.190 port 48698 ssh2 Feb 9 21:08:08.376225 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:08.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:08.376225 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:08.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:08.376225 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:08.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:08.376225 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:08.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:08.376225 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:08.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:08.495825 sshd[3021]: Received disconnect from 42.51.37.190 port 48698:11: Bye Bye [preauth] Feb 9 21:08:08.495825 sshd[3021]: Disconnected from invalid user taaaghi 42.51.37.190 port 48698 [preauth] Feb 9 21:08:08.498454 systemd[1]: sshd@198-139.178.89.23:22-42.51.37.190:48698.service: Deactivated successfully. Feb 9 21:08:09.876771 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:09.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:09.876771 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:09.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:09.876771 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:09.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:09.876771 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:09.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:09.876771 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:09.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:09.892268 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:09.891Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:08:11.375851 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:11.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:11.375851 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:11.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:11.375851 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:11.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:11.375851 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:11.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:11.375851 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:11.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:11.890207 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:11.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:11.890207 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:11.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:11.896622 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:11.896Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:11.896622 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:11.896Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:12.266108 systemd[1]: Started sshd@199-139.178.89.23:22-101.43.121.33:56106.service. Feb 9 21:08:12.875972 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:12.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:12.875972 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:12.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:12.875972 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:12.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:12.875972 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:12.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:12.875972 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:12.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:13.066000 sshd[3025]: Invalid user yaghooti from 101.43.121.33 port 56106 Feb 9 21:08:13.072255 sshd[3025]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:13.073290 sshd[3025]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:08:13.073413 sshd[3025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.121.33 Feb 9 21:08:13.074326 sshd[3025]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:13.555796 systemd[1]: Started sshd@200-139.178.89.23:22-139.178.89.65:59386.service. Feb 9 21:08:13.589459 sshd[3028]: Accepted publickey for core from 139.178.89.65 port 59386 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:08:13.590309 sshd[3028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:08:13.593160 systemd-logind[1456]: New session 116 of user core. Feb 9 21:08:13.593768 systemd[1]: Started session-116.scope. Feb 9 21:08:13.648570 sshd[3028]: pam_unix(sshd:session): session closed for user core Feb 9 21:08:13.650289 systemd[1]: sshd@200-139.178.89.23:22-139.178.89.65:59386.service: Deactivated successfully. Feb 9 21:08:13.650598 systemd[1]: session-116.scope: Deactivated successfully. Feb 9 21:08:13.650957 systemd-logind[1456]: Session 116 logged out. Waiting for processes to exit. Feb 9 21:08:13.651458 systemd[1]: Started sshd@201-139.178.89.23:22-139.178.89.65:59390.service. Feb 9 21:08:13.651985 systemd-logind[1456]: Removed session 116. Feb 9 21:08:13.685211 sshd[3034]: Accepted publickey for core from 139.178.89.65 port 59390 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:08:13.686053 sshd[3034]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:08:13.689032 systemd-logind[1456]: New session 117 of user core. Feb 9 21:08:13.689560 systemd[1]: Started session-117.scope. Feb 9 21:08:13.742935 sshd[3034]: pam_unix(sshd:session): session closed for user core Feb 9 21:08:13.744134 systemd[1]: sshd@201-139.178.89.23:22-139.178.89.65:59390.service: Deactivated successfully. Feb 9 21:08:13.744536 systemd[1]: session-117.scope: Deactivated successfully. Feb 9 21:08:13.744900 systemd-logind[1456]: Session 117 logged out. Waiting for processes to exit. Feb 9 21:08:13.745335 systemd-logind[1456]: Removed session 117. Feb 9 21:08:14.375941 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:14.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:14.375941 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:14.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:14.375941 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:14.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:14.375941 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:14.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:14.375941 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:14.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:15.092708 sshd[3025]: Failed password for invalid user yaghooti from 101.43.121.33 port 56106 ssh2 Feb 9 21:08:15.875845 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:15.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:15.875845 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:15.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:15.875845 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:15.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:15.875845 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:15.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:15.875845 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:15.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:16.444340 sshd[3025]: Received disconnect from 101.43.121.33 port 56106:11: Bye Bye [preauth] Feb 9 21:08:16.444340 sshd[3025]: Disconnected from invalid user yaghooti 101.43.121.33 port 56106 [preauth] Feb 9 21:08:16.447049 systemd[1]: sshd@199-139.178.89.23:22-101.43.121.33:56106.service: Deactivated successfully. Feb 9 21:08:16.890525 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:16.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:16.890525 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:16.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:16.892811 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:16.892Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:08:16.897032 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:16.896Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:16.897032 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:16.896Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:17.376383 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:17.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:17.376383 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:17.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:17.376383 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:17.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:17.376383 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:17.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:17.376383 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:17.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:18.876042 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:18.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:18.876042 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:18.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:18.876042 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:18.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:18.876042 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:18.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:18.876042 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:18.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:20.376818 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:20.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:20.376818 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:20.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:20.376818 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:20.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:20.376818 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:20.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:20.376818 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:20.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:21.876147 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:21.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:21.876147 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:21.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:21.876147 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:21.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:21.876147 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:21.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:21.876147 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:21.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:21.891193 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:21.890Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:21.891193 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:21.890Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:21.897726 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:21.897Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:21.897726 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:21.897Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:23.376783 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:23.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:23.376783 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:23.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:23.376783 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:23.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:23.376783 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:23.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:23.376783 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:23.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:23.751561 systemd[1]: Started sshd@202-139.178.89.23:22-139.178.89.65:40968.service. Feb 9 21:08:23.784510 sshd[3042]: Accepted publickey for core from 139.178.89.65 port 40968 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:08:23.785315 sshd[3042]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:08:23.788098 systemd-logind[1456]: New session 118 of user core. Feb 9 21:08:23.788649 systemd[1]: Started session-118.scope. Feb 9 21:08:23.844273 sshd[3042]: pam_unix(sshd:session): session closed for user core Feb 9 21:08:23.846031 systemd[1]: sshd@202-139.178.89.23:22-139.178.89.65:40968.service: Deactivated successfully. Feb 9 21:08:23.846411 systemd[1]: session-118.scope: Deactivated successfully. Feb 9 21:08:23.846795 systemd-logind[1456]: Session 118 logged out. Waiting for processes to exit. Feb 9 21:08:23.847299 systemd[1]: Started sshd@203-139.178.89.23:22-139.178.89.65:40976.service. Feb 9 21:08:23.847811 systemd-logind[1456]: Removed session 118. Feb 9 21:08:23.880739 sshd[3048]: Accepted publickey for core from 139.178.89.65 port 40976 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:08:23.881589 sshd[3048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:08:23.884441 systemd-logind[1456]: New session 119 of user core. Feb 9 21:08:23.885014 systemd[1]: Started session-119.scope. Feb 9 21:08:23.892855 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:23.892Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:08:23.939987 sshd[3048]: pam_unix(sshd:session): session closed for user core Feb 9 21:08:23.941260 systemd[1]: sshd@203-139.178.89.23:22-139.178.89.65:40976.service: Deactivated successfully. Feb 9 21:08:23.941703 systemd[1]: session-119.scope: Deactivated successfully. Feb 9 21:08:23.942066 systemd-logind[1456]: Session 119 logged out. Waiting for processes to exit. Feb 9 21:08:23.942554 systemd-logind[1456]: Removed session 119. Feb 9 21:08:24.875809 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:24.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:24.875809 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:24.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:24.875809 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:24.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:24.875809 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:24.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:24.875809 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:24.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:26.375938 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:26.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:26.375938 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:26.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:26.375938 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:26.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:26.375938 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:26.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:26.375938 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:26.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:26.892152 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:26.891Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:26.892152 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:26.891Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:26.898851 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:26.898Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:26.898851 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:26.898Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:27.875846 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:27.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:27.875846 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:27.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:27.875846 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:27.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:27.875846 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:27.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:27.875846 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:27.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:29.133115 systemd[1]: Started sshd@204-139.178.89.23:22-43.153.207.95:44782.service. Feb 9 21:08:29.376872 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:29.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:29.376872 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:29.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:29.376872 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:29.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:29.376872 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:29.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:29.376872 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:29.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:30.182835 sshd[3055]: Invalid user drum from 43.153.207.95 port 44782 Feb 9 21:08:30.188982 sshd[3055]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:30.190133 sshd[3055]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:08:30.190221 sshd[3055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.207.95 Feb 9 21:08:30.191196 sshd[3055]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:30.875938 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:30.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:30.875938 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:30.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:30.875938 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:30.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:30.875938 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:30.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:30.875938 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:30.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:30.894041 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:30.893Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:08:31.893132 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:31.892Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:31.893132 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:31.892Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:31.899446 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:31.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:31.899446 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:31.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:32.376131 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:32.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:32.376131 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:32.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:32.376131 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:32.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:32.376131 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:32.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:32.376131 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:32.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:32.545488 sshd[3055]: Failed password for invalid user drum from 43.153.207.95 port 44782 ssh2 Feb 9 21:08:33.876284 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:33.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:33.876284 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:33.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:33.876284 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:33.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:33.876284 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:33.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:33.876284 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:33.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:33.949037 systemd[1]: Started sshd@205-139.178.89.23:22-139.178.89.65:58574.service. Feb 9 21:08:33.982508 sshd[3058]: Accepted publickey for core from 139.178.89.65 port 58574 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:08:33.983146 sshd[3058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:08:33.985483 systemd-logind[1456]: New session 120 of user core. Feb 9 21:08:33.985975 systemd[1]: Started session-120.scope. Feb 9 21:08:34.036855 sshd[3058]: pam_unix(sshd:session): session closed for user core Feb 9 21:08:34.038529 systemd[1]: sshd@205-139.178.89.23:22-139.178.89.65:58574.service: Deactivated successfully. Feb 9 21:08:34.038868 systemd[1]: session-120.scope: Deactivated successfully. Feb 9 21:08:34.039208 systemd-logind[1456]: Session 120 logged out. Waiting for processes to exit. Feb 9 21:08:34.039764 systemd[1]: Started sshd@206-139.178.89.23:22-139.178.89.65:58590.service. Feb 9 21:08:34.040218 systemd-logind[1456]: Removed session 120. Feb 9 21:08:34.073398 sshd[3064]: Accepted publickey for core from 139.178.89.65 port 58590 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:08:34.074096 sshd[3064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:08:34.076295 systemd-logind[1456]: New session 121 of user core. Feb 9 21:08:34.076804 systemd[1]: Started session-121.scope. Feb 9 21:08:34.129255 sshd[3064]: pam_unix(sshd:session): session closed for user core Feb 9 21:08:34.130479 systemd[1]: sshd@206-139.178.89.23:22-139.178.89.65:58590.service: Deactivated successfully. Feb 9 21:08:34.130914 systemd[1]: session-121.scope: Deactivated successfully. Feb 9 21:08:34.131250 systemd-logind[1456]: Session 121 logged out. Waiting for processes to exit. Feb 9 21:08:34.131903 systemd-logind[1456]: Removed session 121. Feb 9 21:08:34.416464 sshd[3055]: Received disconnect from 43.153.207.95 port 44782:11: Bye Bye [preauth] Feb 9 21:08:34.416464 sshd[3055]: Disconnected from invalid user drum 43.153.207.95 port 44782 [preauth] Feb 9 21:08:34.419020 systemd[1]: sshd@204-139.178.89.23:22-43.153.207.95:44782.service: Deactivated successfully. Feb 9 21:08:34.988114 systemd[1]: Started sshd@207-139.178.89.23:22-192.241.153.100:50488.service. Feb 9 21:08:35.375813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:35.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:35.375813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:35.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:35.375813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:35.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:35.375813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:35.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:35.375813 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:35.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:35.409215 sshd[3072]: Invalid user nafas from 192.241.153.100 port 50488 Feb 9 21:08:35.415307 sshd[3072]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:35.416141 sshd[3072]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:08:35.416158 sshd[3072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.153.100 Feb 9 21:08:35.416335 sshd[3072]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:36.876588 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:36.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:36.876588 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:36.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:36.876588 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:36.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:36.876588 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:36.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:36.876588 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:36.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:36.894152 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:36.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:36.894152 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:36.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:36.900607 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:36.900Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:36.900607 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:36.900Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:37.199173 systemd[1]: Started sshd@208-139.178.89.23:22-103.237.87.215:48060.service. Feb 9 21:08:37.454651 sshd[3072]: Failed password for invalid user nafas from 192.241.153.100 port 50488 ssh2 Feb 9 21:08:37.894375 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:37.893Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:08:38.050838 sshd[3072]: Received disconnect from 192.241.153.100 port 50488:11: Bye Bye [preauth] Feb 9 21:08:38.050838 sshd[3072]: Disconnected from invalid user nafas 192.241.153.100 port 50488 [preauth] Feb 9 21:08:38.053476 systemd[1]: sshd@207-139.178.89.23:22-192.241.153.100:50488.service: Deactivated successfully. Feb 9 21:08:38.341119 sshd[3075]: Invalid user junpeng from 103.237.87.215 port 48060 Feb 9 21:08:38.347099 sshd[3075]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:38.348151 sshd[3075]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:08:38.348239 sshd[3075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.237.87.215 Feb 9 21:08:38.349194 sshd[3075]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:38.376668 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:38.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:38.376668 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:38.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:38.376668 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:38.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:38.376668 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:38.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:38.376668 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:38.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:39.800381 sshd[3075]: Failed password for invalid user junpeng from 103.237.87.215 port 48060 ssh2 Feb 9 21:08:39.876680 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:39.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:39.876680 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:39.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:39.876680 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:39.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:39.876680 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:39.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:39.876680 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:39.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:40.861844 sshd[3075]: Received disconnect from 103.237.87.215 port 48060:11: Bye Bye [preauth] Feb 9 21:08:40.861844 sshd[3075]: Disconnected from invalid user junpeng 103.237.87.215 port 48060 [preauth] Feb 9 21:08:40.864613 systemd[1]: sshd@208-139.178.89.23:22-103.237.87.215:48060.service: Deactivated successfully. Feb 9 21:08:41.376431 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:41.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:41.376431 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:41.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:41.376431 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:41.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:41.376431 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:41.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:41.376431 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:41.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:41.894926 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:41.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:41.894926 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:41.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:41.901348 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:41.900Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:41.901348 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:41.900Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:42.588754 systemd[1]: Started sshd@209-139.178.89.23:22-175.139.200.245:43804.service. Feb 9 21:08:42.876810 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:42.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:42.876810 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:42.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:42.876810 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:42.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:42.876810 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:42.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:42.876810 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:42.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:43.223148 systemd[1]: Started sshd@210-139.178.89.23:22-121.11.103.144:36616.service. Feb 9 21:08:43.755188 sshd[3081]: Invalid user mnwork from 175.139.200.245 port 43804 Feb 9 21:08:43.761682 sshd[3081]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:43.762754 sshd[3081]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:08:43.762842 sshd[3081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.200.245 Feb 9 21:08:43.763765 sshd[3081]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:44.138086 systemd[1]: Started sshd@211-139.178.89.23:22-139.178.89.65:54864.service. Feb 9 21:08:44.171410 sshd[3087]: Accepted publickey for core from 139.178.89.65 port 54864 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:08:44.172219 sshd[3087]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:08:44.175161 systemd-logind[1456]: New session 122 of user core. Feb 9 21:08:44.175761 systemd[1]: Started session-122.scope. Feb 9 21:08:44.230864 sshd[3087]: pam_unix(sshd:session): session closed for user core Feb 9 21:08:44.232633 systemd[1]: sshd@211-139.178.89.23:22-139.178.89.65:54864.service: Deactivated successfully. Feb 9 21:08:44.232943 systemd[1]: session-122.scope: Deactivated successfully. Feb 9 21:08:44.233269 systemd-logind[1456]: Session 122 logged out. Waiting for processes to exit. Feb 9 21:08:44.233803 systemd[1]: Started sshd@212-139.178.89.23:22-139.178.89.65:54872.service. Feb 9 21:08:44.234242 systemd-logind[1456]: Removed session 122. Feb 9 21:08:44.247690 sshd[3084]: Invalid user typia from 121.11.103.144 port 36616 Feb 9 21:08:44.249015 sshd[3084]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:44.249243 sshd[3084]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:08:44.249261 sshd[3084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.103.144 Feb 9 21:08:44.249460 sshd[3084]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:44.267344 sshd[3093]: Accepted publickey for core from 139.178.89.65 port 54872 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:08:44.268172 sshd[3093]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:08:44.271036 systemd-logind[1456]: New session 123 of user core. Feb 9 21:08:44.271626 systemd[1]: Started session-123.scope. Feb 9 21:08:44.324197 sshd[3093]: pam_unix(sshd:session): session closed for user core Feb 9 21:08:44.325407 systemd[1]: sshd@212-139.178.89.23:22-139.178.89.65:54872.service: Deactivated successfully. Feb 9 21:08:44.325806 systemd[1]: session-123.scope: Deactivated successfully. Feb 9 21:08:44.326180 systemd-logind[1456]: Session 123 logged out. Waiting for processes to exit. Feb 9 21:08:44.326792 systemd-logind[1456]: Removed session 123. Feb 9 21:08:44.376298 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:44.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:44.376298 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:44.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:44.376298 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:44.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:44.376298 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:44.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:44.376298 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:44.376Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:44.895287 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:44.894Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"967872570d3885c9","local-member-attributes":"{Name:2afa3269441d444280311337f2bec5e3 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/967872570d3885c9/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"} Feb 9 21:08:45.524657 sshd[3084]: Failed password for invalid user typia from 121.11.103.144 port 36616 ssh2 Feb 9 21:08:45.876429 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:45.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:45.876429 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:45.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:45.876429 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:45.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:45.876429 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:45.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:45.876429 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:45.875Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:45.902281 sshd[3081]: Failed password for invalid user mnwork from 175.139.200.245 port 43804 ssh2 Feb 9 21:08:46.630334 sshd[3084]: Received disconnect from 121.11.103.144 port 36616:11: Bye Bye [preauth] Feb 9 21:08:46.630334 sshd[3084]: Disconnected from invalid user typia 121.11.103.144 port 36616 [preauth] Feb 9 21:08:46.632857 systemd[1]: sshd@210-139.178.89.23:22-121.11.103.144:36616.service: Deactivated successfully. Feb 9 21:08:46.896054 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:46.895Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:46.896054 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:46.895Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"1f1e3e590b92487a","rtt":"0s","error":"dial tcp 10.67.80.15:2380: i/o timeout"} Feb 9 21:08:46.902445 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:46.901Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:46.902445 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-09T21:08:46.902Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: i/o timeout"} Feb 9 21:08:46.979782 sshd[3081]: Received disconnect from 175.139.200.245 port 43804:11: Bye Bye [preauth] Feb 9 21:08:46.979782 sshd[3081]: Disconnected from invalid user mnwork 175.139.200.245 port 43804 [preauth] Feb 9 21:08:46.982391 systemd[1]: sshd@209-139.178.89.23:22-175.139.200.245:43804.service: Deactivated successfully. Feb 9 21:08:47.375992 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:47.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:47.375992 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:47.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:47.375992 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:47.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:47.375992 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:47.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:47.375992 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:47.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:48.876638 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:48.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:48.876638 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:48.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:48.876638 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:48.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:48.876638 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:48.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:48.876638 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:48.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"} Feb 9 21:08:50.376053 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:50.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 is starting a new election at term 1"} Feb 9 21:08:50.376053 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:50.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 became pre-candidate at term 1"} Feb 9 21:08:50.376053 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:50.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 received MsgPreVoteResp from 967872570d3885c9 at term 1"} Feb 9 21:08:50.376053 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:50.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 1f1e3e590b92487a at term 1"} Feb 9 21:08:50.376053 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-09T21:08:50.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"967872570d3885c9 [logterm: 1, index: 3] sent MsgPreVote request to 59ba8d9751c40a95 at term 1"}