Feb 9 21:06:42.574239 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 9 21:06:42.574253 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 21:06:42.574259 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 21:06:42.574263 kernel: BIOS-provided physical RAM map: Feb 9 21:06:42.574267 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 21:06:42.574271 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 21:06:42.574275 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 21:06:42.574280 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 21:06:42.574284 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 21:06:42.574288 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000006dfb3fff] usable Feb 9 21:06:42.574291 kernel: BIOS-e820: [mem 0x000000006dfb4000-0x000000006dfb4fff] ACPI NVS Feb 9 21:06:42.574295 kernel: BIOS-e820: [mem 0x000000006dfb5000-0x000000006dfb5fff] reserved Feb 9 21:06:42.574299 kernel: BIOS-e820: [mem 0x000000006dfb6000-0x0000000077fc6fff] usable Feb 9 21:06:42.574303 kernel: BIOS-e820: [mem 0x0000000077fc7000-0x00000000790a9fff] reserved Feb 9 21:06:42.574309 kernel: BIOS-e820: [mem 0x00000000790aa000-0x0000000079232fff] usable Feb 9 21:06:42.574313 kernel: BIOS-e820: [mem 0x0000000079233000-0x0000000079664fff] ACPI NVS Feb 9 21:06:42.574317 kernel: BIOS-e820: [mem 0x0000000079665000-0x000000007befefff] reserved Feb 9 21:06:42.574321 kernel: BIOS-e820: [mem 0x000000007beff000-0x000000007befffff] usable Feb 9 21:06:42.574325 kernel: BIOS-e820: [mem 0x000000007bf00000-0x000000007f7fffff] reserved Feb 9 21:06:42.574330 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 21:06:42.574334 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 21:06:42.574338 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 21:06:42.574342 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 21:06:42.574347 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 21:06:42.574351 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087f7fffff] usable Feb 9 21:06:42.574355 kernel: NX (Execute Disable) protection: active Feb 9 21:06:42.574359 kernel: SMBIOS 3.2.1 present. Feb 9 21:06:42.574363 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 9 21:06:42.574367 kernel: tsc: Detected 3400.000 MHz processor Feb 9 21:06:42.574372 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 21:06:42.574376 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 21:06:42.574381 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 21:06:42.574385 kernel: last_pfn = 0x87f800 max_arch_pfn = 0x400000000 Feb 9 21:06:42.574389 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 21:06:42.574395 kernel: last_pfn = 0x7bf00 max_arch_pfn = 0x400000000 Feb 9 21:06:42.574399 kernel: Using GB pages for direct mapping Feb 9 21:06:42.574403 kernel: ACPI: Early table checksum verification disabled Feb 9 21:06:42.574407 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 21:06:42.574412 kernel: ACPI: XSDT 0x00000000795460C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 21:06:42.574416 kernel: ACPI: FACP 0x0000000079582620 000114 (v06 01072009 AMI 00010013) Feb 9 21:06:42.574423 kernel: ACPI: DSDT 0x0000000079546268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 21:06:42.574428 kernel: ACPI: FACS 0x0000000079664F80 000040 Feb 9 21:06:42.574433 kernel: ACPI: APIC 0x0000000079582738 00012C (v04 01072009 AMI 00010013) Feb 9 21:06:42.574438 kernel: ACPI: FPDT 0x0000000079582868 000044 (v01 01072009 AMI 00010013) Feb 9 21:06:42.574442 kernel: ACPI: FIDT 0x00000000795828B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 21:06:42.574449 kernel: ACPI: MCFG 0x0000000079582950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 21:06:42.574454 kernel: ACPI: SPMI 0x0000000079582990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 21:06:42.574459 kernel: ACPI: SSDT 0x00000000795829D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 21:06:42.574464 kernel: ACPI: SSDT 0x00000000795844F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 21:06:42.574468 kernel: ACPI: SSDT 0x00000000795876C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 21:06:42.574473 kernel: ACPI: HPET 0x00000000795899F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:06:42.574478 kernel: ACPI: SSDT 0x0000000079589A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 21:06:42.574482 kernel: ACPI: SSDT 0x000000007958A9D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 21:06:42.574487 kernel: ACPI: UEFI 0x000000007958B2D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:06:42.574492 kernel: ACPI: LPIT 0x000000007958B318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:06:42.574496 kernel: ACPI: SSDT 0x000000007958B3B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 21:06:42.574502 kernel: ACPI: SSDT 0x000000007958DB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 21:06:42.574506 kernel: ACPI: DBGP 0x000000007958F078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:06:42.574511 kernel: ACPI: DBG2 0x000000007958F0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:06:42.574516 kernel: ACPI: SSDT 0x000000007958F108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 21:06:42.574520 kernel: ACPI: DMAR 0x0000000079590C70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 9 21:06:42.574525 kernel: ACPI: SSDT 0x0000000079590D18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 21:06:42.574530 kernel: ACPI: TPM2 0x0000000079590E60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 21:06:42.574534 kernel: ACPI: SSDT 0x0000000079590E98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 21:06:42.574539 kernel: ACPI: WSMT 0x0000000079591C28 000028 (v01 \xf4m 01072009 AMI 00010013) Feb 9 21:06:42.574545 kernel: ACPI: EINJ 0x0000000079591C50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 21:06:42.574549 kernel: ACPI: ERST 0x0000000079591D80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 21:06:42.574554 kernel: ACPI: BERT 0x0000000079591FB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 21:06:42.574559 kernel: ACPI: HEST 0x0000000079591FE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 21:06:42.574563 kernel: ACPI: SSDT 0x0000000079592260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 21:06:42.574568 kernel: ACPI: Reserving FACP table memory at [mem 0x79582620-0x79582733] Feb 9 21:06:42.574573 kernel: ACPI: Reserving DSDT table memory at [mem 0x79546268-0x7958261e] Feb 9 21:06:42.574577 kernel: ACPI: Reserving FACS table memory at [mem 0x79664f80-0x79664fbf] Feb 9 21:06:42.574583 kernel: ACPI: Reserving APIC table memory at [mem 0x79582738-0x79582863] Feb 9 21:06:42.574588 kernel: ACPI: Reserving FPDT table memory at [mem 0x79582868-0x795828ab] Feb 9 21:06:42.574592 kernel: ACPI: Reserving FIDT table memory at [mem 0x795828b0-0x7958294b] Feb 9 21:06:42.574597 kernel: ACPI: Reserving MCFG table memory at [mem 0x79582950-0x7958298b] Feb 9 21:06:42.574601 kernel: ACPI: Reserving SPMI table memory at [mem 0x79582990-0x795829d0] Feb 9 21:06:42.574606 kernel: ACPI: Reserving SSDT table memory at [mem 0x795829d8-0x795844f3] Feb 9 21:06:42.574610 kernel: ACPI: Reserving SSDT table memory at [mem 0x795844f8-0x795876bd] Feb 9 21:06:42.574615 kernel: ACPI: Reserving SSDT table memory at [mem 0x795876c0-0x795899ea] Feb 9 21:06:42.574620 kernel: ACPI: Reserving HPET table memory at [mem 0x795899f0-0x79589a27] Feb 9 21:06:42.574625 kernel: ACPI: Reserving SSDT table memory at [mem 0x79589a28-0x7958a9d5] Feb 9 21:06:42.574630 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958a9d8-0x7958b2ce] Feb 9 21:06:42.574634 kernel: ACPI: Reserving UEFI table memory at [mem 0x7958b2d0-0x7958b311] Feb 9 21:06:42.574639 kernel: ACPI: Reserving LPIT table memory at [mem 0x7958b318-0x7958b3ab] Feb 9 21:06:42.574644 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958b3b0-0x7958db8d] Feb 9 21:06:42.574648 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958db90-0x7958f071] Feb 9 21:06:42.574653 kernel: ACPI: Reserving DBGP table memory at [mem 0x7958f078-0x7958f0ab] Feb 9 21:06:42.574657 kernel: ACPI: Reserving DBG2 table memory at [mem 0x7958f0b0-0x7958f103] Feb 9 21:06:42.574662 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958f108-0x79590c6e] Feb 9 21:06:42.574668 kernel: ACPI: Reserving DMAR table memory at [mem 0x79590c70-0x79590d17] Feb 9 21:06:42.574672 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590d18-0x79590e5b] Feb 9 21:06:42.574677 kernel: ACPI: Reserving TPM2 table memory at [mem 0x79590e60-0x79590e93] Feb 9 21:06:42.574681 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590e98-0x79591c26] Feb 9 21:06:42.574686 kernel: ACPI: Reserving WSMT table memory at [mem 0x79591c28-0x79591c4f] Feb 9 21:06:42.574691 kernel: ACPI: Reserving EINJ table memory at [mem 0x79591c50-0x79591d7f] Feb 9 21:06:42.574695 kernel: ACPI: Reserving ERST table memory at [mem 0x79591d80-0x79591faf] Feb 9 21:06:42.574700 kernel: ACPI: Reserving BERT table memory at [mem 0x79591fb0-0x79591fdf] Feb 9 21:06:42.574704 kernel: ACPI: Reserving HEST table memory at [mem 0x79591fe0-0x7959225b] Feb 9 21:06:42.574710 kernel: ACPI: Reserving SSDT table memory at [mem 0x79592260-0x795923c1] Feb 9 21:06:42.574714 kernel: No NUMA configuration found Feb 9 21:06:42.574719 kernel: Faking a node at [mem 0x0000000000000000-0x000000087f7fffff] Feb 9 21:06:42.574724 kernel: NODE_DATA(0) allocated [mem 0x87f7fa000-0x87f7fffff] Feb 9 21:06:42.574729 kernel: Zone ranges: Feb 9 21:06:42.574733 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 21:06:42.574738 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 21:06:42.574743 kernel: Normal [mem 0x0000000100000000-0x000000087f7fffff] Feb 9 21:06:42.574747 kernel: Movable zone start for each node Feb 9 21:06:42.574752 kernel: Early memory node ranges Feb 9 21:06:42.574757 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 21:06:42.574762 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 21:06:42.574767 kernel: node 0: [mem 0x0000000040400000-0x000000006dfb3fff] Feb 9 21:06:42.574771 kernel: node 0: [mem 0x000000006dfb6000-0x0000000077fc6fff] Feb 9 21:06:42.574776 kernel: node 0: [mem 0x00000000790aa000-0x0000000079232fff] Feb 9 21:06:42.574780 kernel: node 0: [mem 0x000000007beff000-0x000000007befffff] Feb 9 21:06:42.574785 kernel: node 0: [mem 0x0000000100000000-0x000000087f7fffff] Feb 9 21:06:42.574790 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087f7fffff] Feb 9 21:06:42.574798 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 21:06:42.574803 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 21:06:42.574808 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 21:06:42.574814 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 21:06:42.574819 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 9 21:06:42.574824 kernel: On node 0, zone DMA32: 11468 pages in unavailable ranges Feb 9 21:06:42.574829 kernel: On node 0, zone Normal: 16640 pages in unavailable ranges Feb 9 21:06:42.574834 kernel: On node 0, zone Normal: 2048 pages in unavailable ranges Feb 9 21:06:42.574840 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 21:06:42.574845 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 21:06:42.574850 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 21:06:42.574855 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 21:06:42.574860 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 21:06:42.574865 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 21:06:42.574870 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 21:06:42.574875 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 21:06:42.574880 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 21:06:42.574886 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 21:06:42.574890 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 21:06:42.574895 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 21:06:42.574900 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 21:06:42.574905 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 21:06:42.574910 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 21:06:42.574915 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 21:06:42.574920 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 21:06:42.574925 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 21:06:42.574930 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 21:06:42.574936 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 21:06:42.574941 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 21:06:42.574946 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 21:06:42.574950 kernel: TSC deadline timer available Feb 9 21:06:42.574955 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 21:06:42.574960 kernel: [mem 0x7f800000-0xdfffffff] available for PCI devices Feb 9 21:06:42.574965 kernel: Booting paravirtualized kernel on bare hardware Feb 9 21:06:42.574970 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 21:06:42.574975 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 21:06:42.574981 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 21:06:42.574986 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 21:06:42.574991 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 21:06:42.574996 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8222329 Feb 9 21:06:42.575001 kernel: Policy zone: Normal Feb 9 21:06:42.575007 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 21:06:42.575012 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 21:06:42.575017 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 21:06:42.575023 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 21:06:42.575028 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 21:06:42.575033 kernel: Memory: 32683736K/33411996K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 9 21:06:42.575038 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 21:06:42.575043 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 21:06:42.575048 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 21:06:42.575053 kernel: rcu: Hierarchical RCU implementation. Feb 9 21:06:42.575058 kernel: rcu: RCU event tracing is enabled. Feb 9 21:06:42.575064 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 21:06:42.575069 kernel: Rude variant of Tasks RCU enabled. Feb 9 21:06:42.575074 kernel: Tracing variant of Tasks RCU enabled. Feb 9 21:06:42.575079 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 21:06:42.575084 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 21:06:42.575089 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 21:06:42.575094 kernel: random: crng init done Feb 9 21:06:42.575098 kernel: Console: colour dummy device 80x25 Feb 9 21:06:42.575103 kernel: printk: console [tty0] enabled Feb 9 21:06:42.575108 kernel: printk: console [ttyS1] enabled Feb 9 21:06:42.575114 kernel: ACPI: Core revision 20210730 Feb 9 21:06:42.575119 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 9 21:06:42.575124 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 21:06:42.575129 kernel: DMAR: Host address width 39 Feb 9 21:06:42.575134 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 9 21:06:42.575139 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 9 21:06:42.575144 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 21:06:42.575149 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 21:06:42.575154 kernel: DMAR: RMRR base: 0x00000079f11000 end: 0x0000007a15afff Feb 9 21:06:42.575160 kernel: DMAR: RMRR base: 0x0000007d000000 end: 0x0000007f7fffff Feb 9 21:06:42.575165 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 9 21:06:42.575170 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 21:06:42.575175 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 21:06:42.575180 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 21:06:42.575185 kernel: x2apic enabled Feb 9 21:06:42.575190 kernel: Switched APIC routing to cluster x2apic. Feb 9 21:06:42.575195 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 21:06:42.575200 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 21:06:42.575206 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 21:06:42.575211 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 21:06:42.575216 kernel: process: using mwait in idle threads Feb 9 21:06:42.575221 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 21:06:42.575226 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 21:06:42.575230 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 21:06:42.575236 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 21:06:42.575241 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 21:06:42.575247 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 21:06:42.575251 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 21:06:42.575257 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 21:06:42.575262 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 21:06:42.575267 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 21:06:42.575272 kernel: TAA: Mitigation: TSX disabled Feb 9 21:06:42.575277 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 21:06:42.575281 kernel: SRBDS: Mitigation: Microcode Feb 9 21:06:42.575286 kernel: GDS: Vulnerable: No microcode Feb 9 21:06:42.575293 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 21:06:42.575298 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 21:06:42.575303 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 21:06:42.575307 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 21:06:42.575312 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 21:06:42.575317 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 21:06:42.575322 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 21:06:42.575327 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 21:06:42.575332 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 21:06:42.575338 kernel: Freeing SMP alternatives memory: 32K Feb 9 21:06:42.575343 kernel: pid_max: default: 32768 minimum: 301 Feb 9 21:06:42.575348 kernel: LSM: Security Framework initializing Feb 9 21:06:42.575353 kernel: SELinux: Initializing. Feb 9 21:06:42.575358 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 21:06:42.575363 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 21:06:42.575368 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 21:06:42.575373 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 21:06:42.575378 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 21:06:42.575384 kernel: ... version: 4 Feb 9 21:06:42.575389 kernel: ... bit width: 48 Feb 9 21:06:42.575394 kernel: ... generic registers: 4 Feb 9 21:06:42.575399 kernel: ... value mask: 0000ffffffffffff Feb 9 21:06:42.575404 kernel: ... max period: 00007fffffffffff Feb 9 21:06:42.575408 kernel: ... fixed-purpose events: 3 Feb 9 21:06:42.575413 kernel: ... event mask: 000000070000000f Feb 9 21:06:42.575418 kernel: signal: max sigframe size: 2032 Feb 9 21:06:42.575423 kernel: rcu: Hierarchical SRCU implementation. Feb 9 21:06:42.575429 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 21:06:42.575434 kernel: smp: Bringing up secondary CPUs ... Feb 9 21:06:42.575439 kernel: x86: Booting SMP configuration: Feb 9 21:06:42.575444 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 21:06:42.575451 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 21:06:42.575456 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 21:06:42.575461 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 21:06:42.575466 kernel: smpboot: Max logical packages: 1 Feb 9 21:06:42.575471 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 21:06:42.575476 kernel: devtmpfs: initialized Feb 9 21:06:42.575481 kernel: x86/mm: Memory block size: 128MB Feb 9 21:06:42.575486 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6dfb4000-0x6dfb4fff] (4096 bytes) Feb 9 21:06:42.575491 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x79233000-0x79664fff] (4399104 bytes) Feb 9 21:06:42.575496 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 21:06:42.575501 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 21:06:42.575506 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 21:06:42.575511 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 21:06:42.575516 kernel: audit: initializing netlink subsys (disabled) Feb 9 21:06:42.575522 kernel: audit: type=2000 audit(1707512797.119:1): state=initialized audit_enabled=0 res=1 Feb 9 21:06:42.575527 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 21:06:42.575532 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 21:06:42.575537 kernel: cpuidle: using governor menu Feb 9 21:06:42.575542 kernel: ACPI: bus type PCI registered Feb 9 21:06:42.575547 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 21:06:42.575552 kernel: dca service started, version 1.12.1 Feb 9 21:06:42.575557 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 21:06:42.575561 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 21:06:42.575567 kernel: PCI: Using configuration type 1 for base access Feb 9 21:06:42.575572 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 21:06:42.575577 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 21:06:42.575582 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 21:06:42.575587 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 21:06:42.575592 kernel: ACPI: Added _OSI(Module Device) Feb 9 21:06:42.575597 kernel: ACPI: Added _OSI(Processor Device) Feb 9 21:06:42.575602 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 21:06:42.575607 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 21:06:42.575612 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 21:06:42.575617 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 21:06:42.575622 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 21:06:42.575627 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 21:06:42.575632 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:06:42.575637 kernel: ACPI: SSDT 0xFFFF8EF440215600 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 21:06:42.575642 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 21:06:42.575648 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:06:42.575653 kernel: ACPI: SSDT 0xFFFF8EF441CE9400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 21:06:42.575658 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:06:42.575663 kernel: ACPI: SSDT 0xFFFF8EF441C5E800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 21:06:42.575668 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:06:42.575673 kernel: ACPI: SSDT 0xFFFF8EF441C5D800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 21:06:42.575678 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:06:42.575683 kernel: ACPI: SSDT 0xFFFF8EF44014A000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 21:06:42.575687 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:06:42.575692 kernel: ACPI: SSDT 0xFFFF8EF441CE9000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 21:06:42.575697 kernel: ACPI: Interpreter enabled Feb 9 21:06:42.575703 kernel: ACPI: PM: (supports S0 S5) Feb 9 21:06:42.575708 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 21:06:42.575713 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 21:06:42.575718 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 21:06:42.575723 kernel: HEST: Table parsing has been initialized. Feb 9 21:06:42.575728 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 21:06:42.575733 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 21:06:42.575738 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 21:06:42.575743 kernel: ACPI: PM: Power Resource [USBC] Feb 9 21:06:42.575749 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 21:06:42.575754 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 21:06:42.575758 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 21:06:42.575763 kernel: ACPI: PM: Power Resource [WRST] Feb 9 21:06:42.575768 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 9 21:06:42.575773 kernel: ACPI: PM: Power Resource [FN00] Feb 9 21:06:42.575778 kernel: ACPI: PM: Power Resource [FN01] Feb 9 21:06:42.575783 kernel: ACPI: PM: Power Resource [FN02] Feb 9 21:06:42.575788 kernel: ACPI: PM: Power Resource [FN03] Feb 9 21:06:42.575793 kernel: ACPI: PM: Power Resource [FN04] Feb 9 21:06:42.575798 kernel: ACPI: PM: Power Resource [PIN] Feb 9 21:06:42.575803 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 21:06:42.575866 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 21:06:42.575911 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 21:06:42.575952 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 21:06:42.575959 kernel: PCI host bridge to bus 0000:00 Feb 9 21:06:42.576003 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 21:06:42.576042 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 21:06:42.576079 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 21:06:42.576116 kernel: pci_bus 0000:00: root bus resource [mem 0x7f800000-0xdfffffff window] Feb 9 21:06:42.576151 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 21:06:42.576187 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 21:06:42.576238 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 21:06:42.576290 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 21:06:42.576334 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 21:06:42.576379 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 9 21:06:42.576423 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 9 21:06:42.576470 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 9 21:06:42.576514 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x94000000-0x94ffffff 64bit] Feb 9 21:06:42.576559 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 9 21:06:42.576601 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 9 21:06:42.576646 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 21:06:42.576687 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9651f000-0x9651ffff 64bit] Feb 9 21:06:42.576733 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 21:06:42.576774 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9651e000-0x9651efff 64bit] Feb 9 21:06:42.576819 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 21:06:42.576863 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x96500000-0x9650ffff 64bit] Feb 9 21:06:42.576904 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 21:06:42.576951 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 21:06:42.576994 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x96512000-0x96513fff 64bit] Feb 9 21:06:42.577035 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9651d000-0x9651dfff 64bit] Feb 9 21:06:42.577079 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 21:06:42.577123 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 21:06:42.577167 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 21:06:42.577208 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 21:06:42.577253 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 21:06:42.577294 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9651a000-0x9651afff 64bit] Feb 9 21:06:42.577342 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 21:06:42.577390 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 21:06:42.577431 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x96519000-0x96519fff 64bit] Feb 9 21:06:42.577474 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 21:06:42.577519 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 21:06:42.577560 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x96518000-0x96518fff 64bit] Feb 9 21:06:42.577602 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 21:06:42.577646 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 21:06:42.577690 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x96510000-0x96511fff] Feb 9 21:06:42.577731 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x96517000-0x965170ff] Feb 9 21:06:42.577773 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 9 21:06:42.577815 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 9 21:06:42.577855 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 9 21:06:42.577898 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x96516000-0x965167ff] Feb 9 21:06:42.577938 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 21:06:42.577988 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 21:06:42.578031 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 21:06:42.578077 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 21:06:42.578122 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 21:06:42.578167 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 21:06:42.578210 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 21:06:42.578255 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 21:06:42.578298 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 21:06:42.578343 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 9 21:06:42.578386 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 9 21:06:42.578433 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 21:06:42.578477 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 21:06:42.578525 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 21:06:42.578569 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 21:06:42.578610 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x96514000-0x965140ff 64bit] Feb 9 21:06:42.578650 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 21:06:42.578698 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 21:06:42.578738 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 21:06:42.578780 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 21:06:42.578828 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 21:06:42.578871 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 21:06:42.578915 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x96200000-0x962fffff pref] Feb 9 21:06:42.578957 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 9 21:06:42.579002 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 21:06:42.579044 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 21:06:42.579092 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 21:06:42.579134 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 21:06:42.579177 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x96100000-0x961fffff pref] Feb 9 21:06:42.579219 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 9 21:06:42.579261 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 21:06:42.579306 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 21:06:42.579349 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 21:06:42.579391 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 9 21:06:42.579432 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 21:06:42.579476 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 21:06:42.579523 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 21:06:42.579566 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x96400000-0x9647ffff] Feb 9 21:06:42.579611 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 21:06:42.579654 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x96480000-0x96483fff] Feb 9 21:06:42.579696 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 21:06:42.579738 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 21:06:42.579779 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 21:06:42.579820 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 9 21:06:42.579869 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 9 21:06:42.579912 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x96300000-0x9637ffff] Feb 9 21:06:42.579957 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 21:06:42.580000 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x96380000-0x96383fff] Feb 9 21:06:42.580043 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 9 21:06:42.580085 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 21:06:42.580126 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 21:06:42.580167 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 9 21:06:42.580209 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 21:06:42.580255 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 21:06:42.580300 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 9 21:06:42.580346 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 21:06:42.580449 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 21:06:42.580492 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 21:06:42.580533 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 21:06:42.580574 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 9 21:06:42.580621 kernel: pci_bus 0000:08: extended config space not accessible Feb 9 21:06:42.580673 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 21:06:42.580719 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x95000000-0x95ffffff] Feb 9 21:06:42.580764 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x96000000-0x9601ffff] Feb 9 21:06:42.580809 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 21:06:42.580853 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 21:06:42.580897 kernel: pci 0000:08:00.0: supports D1 D2 Feb 9 21:06:42.580942 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 21:06:42.580988 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 21:06:42.581031 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 21:06:42.581075 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 9 21:06:42.581082 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 21:06:42.581088 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 21:06:42.581093 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 21:06:42.581098 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 21:06:42.581104 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 21:06:42.581110 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 21:06:42.581116 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 21:06:42.581121 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 21:06:42.581126 kernel: iommu: Default domain type: Translated Feb 9 21:06:42.581131 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 21:06:42.581175 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 9 21:06:42.581220 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 21:06:42.581265 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 9 21:06:42.581273 kernel: vgaarb: loaded Feb 9 21:06:42.581280 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 21:06:42.581285 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 21:06:42.581290 kernel: PTP clock support registered Feb 9 21:06:42.581295 kernel: PCI: Using ACPI for IRQ routing Feb 9 21:06:42.581301 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 21:06:42.581306 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 21:06:42.581311 kernel: e820: reserve RAM buffer [mem 0x6dfb4000-0x6fffffff] Feb 9 21:06:42.581316 kernel: e820: reserve RAM buffer [mem 0x77fc7000-0x77ffffff] Feb 9 21:06:42.581322 kernel: e820: reserve RAM buffer [mem 0x79233000-0x7bffffff] Feb 9 21:06:42.581328 kernel: e820: reserve RAM buffer [mem 0x7bf00000-0x7bffffff] Feb 9 21:06:42.581333 kernel: e820: reserve RAM buffer [mem 0x87f800000-0x87fffffff] Feb 9 21:06:42.581338 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 21:06:42.581343 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 9 21:06:42.581349 kernel: clocksource: Switched to clocksource tsc-early Feb 9 21:06:42.581354 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 21:06:42.581359 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 21:06:42.581364 kernel: pnp: PnP ACPI init Feb 9 21:06:42.581408 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 21:06:42.581458 kernel: pnp 00:02: [dma 0 disabled] Feb 9 21:06:42.581499 kernel: pnp 00:03: [dma 0 disabled] Feb 9 21:06:42.581540 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 21:06:42.581579 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 21:06:42.581619 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 21:06:42.581659 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 21:06:42.581699 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 21:06:42.581736 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 21:06:42.581773 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 21:06:42.581811 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 21:06:42.581847 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 21:06:42.581884 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 21:06:42.581921 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 21:06:42.581963 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 21:06:42.582001 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 21:06:42.582038 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 21:06:42.582075 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 21:06:42.582111 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 21:06:42.582148 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 21:06:42.582188 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 21:06:42.582229 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 21:06:42.582237 kernel: pnp: PnP ACPI: found 10 devices Feb 9 21:06:42.582243 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 21:06:42.582249 kernel: NET: Registered PF_INET protocol family Feb 9 21:06:42.582255 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 21:06:42.582260 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 21:06:42.582266 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 21:06:42.582271 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 21:06:42.582277 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 21:06:42.582283 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 21:06:42.582288 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 21:06:42.582293 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 21:06:42.582299 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 21:06:42.582304 kernel: NET: Registered PF_XDP protocol family Feb 9 21:06:42.582347 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7f800000-0x7f800fff 64bit] Feb 9 21:06:42.582389 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7f801000-0x7f801fff 64bit] Feb 9 21:06:42.582433 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7f802000-0x7f802fff 64bit] Feb 9 21:06:42.582477 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 21:06:42.582522 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 21:06:42.582565 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 21:06:42.582609 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 21:06:42.582655 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 21:06:42.582698 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 21:06:42.582741 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 9 21:06:42.582783 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 21:06:42.582825 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 21:06:42.582867 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 21:06:42.582910 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 21:06:42.582952 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 9 21:06:42.582994 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 21:06:42.583037 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 21:06:42.583078 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 9 21:06:42.583120 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 21:06:42.583163 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 21:06:42.583206 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 21:06:42.583248 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 9 21:06:42.583291 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 21:06:42.583332 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 21:06:42.583376 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 9 21:06:42.583414 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 21:06:42.583453 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 21:06:42.583491 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 21:06:42.583527 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 21:06:42.583564 kernel: pci_bus 0000:00: resource 7 [mem 0x7f800000-0xdfffffff window] Feb 9 21:06:42.583600 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 21:06:42.583645 kernel: pci_bus 0000:02: resource 1 [mem 0x96100000-0x962fffff] Feb 9 21:06:42.583686 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 21:06:42.583728 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 9 21:06:42.583768 kernel: pci_bus 0000:04: resource 1 [mem 0x96400000-0x964fffff] Feb 9 21:06:42.583810 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 9 21:06:42.583849 kernel: pci_bus 0000:05: resource 1 [mem 0x96300000-0x963fffff] Feb 9 21:06:42.583891 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 21:06:42.583931 kernel: pci_bus 0000:07: resource 1 [mem 0x95000000-0x960fffff] Feb 9 21:06:42.583972 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 9 21:06:42.584012 kernel: pci_bus 0000:08: resource 1 [mem 0x95000000-0x960fffff] Feb 9 21:06:42.584019 kernel: PCI: CLS 64 bytes, default 64 Feb 9 21:06:42.584025 kernel: DMAR: No ATSR found Feb 9 21:06:42.584030 kernel: DMAR: No SATC found Feb 9 21:06:42.584036 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 9 21:06:42.584041 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 9 21:06:42.584048 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 9 21:06:42.584053 kernel: DMAR: IOMMU feature pasid inconsistent Feb 9 21:06:42.584058 kernel: DMAR: IOMMU feature eafs inconsistent Feb 9 21:06:42.584064 kernel: DMAR: IOMMU feature prs inconsistent Feb 9 21:06:42.584069 kernel: DMAR: IOMMU feature nest inconsistent Feb 9 21:06:42.584074 kernel: DMAR: IOMMU feature mts inconsistent Feb 9 21:06:42.584080 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 9 21:06:42.584085 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 9 21:06:42.584090 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 21:06:42.584096 kernel: DMAR: dmar1: Using Queued invalidation Feb 9 21:06:42.584139 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 21:06:42.584182 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 21:06:42.584225 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 9 21:06:42.584266 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 9 21:06:42.584308 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 9 21:06:42.584350 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 9 21:06:42.584392 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 9 21:06:42.584435 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 9 21:06:42.584478 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 9 21:06:42.584521 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 9 21:06:42.584561 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 9 21:06:42.584603 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 9 21:06:42.584644 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 9 21:06:42.584685 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 9 21:06:42.584727 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 9 21:06:42.584767 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 9 21:06:42.584811 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 9 21:06:42.584852 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 9 21:06:42.584894 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 9 21:06:42.584935 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 9 21:06:42.584976 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 9 21:06:42.585017 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 9 21:06:42.585058 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 9 21:06:42.585101 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 9 21:06:42.585146 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 9 21:06:42.585189 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 21:06:42.585232 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 9 21:06:42.585276 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 9 21:06:42.585321 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 9 21:06:42.585328 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 21:06:42.585334 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 21:06:42.585341 kernel: software IO TLB: mapped [mem 0x0000000073fc7000-0x0000000077fc7000] (64MB) Feb 9 21:06:42.585346 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 9 21:06:42.585352 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 21:06:42.585357 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 21:06:42.585362 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 21:06:42.585368 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 9 21:06:42.585415 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 21:06:42.585423 kernel: Initialise system trusted keyrings Feb 9 21:06:42.585430 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 21:06:42.585435 kernel: Key type asymmetric registered Feb 9 21:06:42.585440 kernel: Asymmetric key parser 'x509' registered Feb 9 21:06:42.585447 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 21:06:42.585453 kernel: io scheduler mq-deadline registered Feb 9 21:06:42.585458 kernel: io scheduler kyber registered Feb 9 21:06:42.585463 kernel: io scheduler bfq registered Feb 9 21:06:42.585505 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 9 21:06:42.585549 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 9 21:06:42.585592 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 9 21:06:42.585634 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 9 21:06:42.585676 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 9 21:06:42.585719 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 9 21:06:42.585762 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 9 21:06:42.585808 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 21:06:42.585816 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 21:06:42.585823 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 21:06:42.585829 kernel: pstore: Registered erst as persistent store backend Feb 9 21:06:42.585834 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 21:06:42.585839 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 21:06:42.585845 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 21:06:42.585850 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 21:06:42.585892 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 21:06:42.585900 kernel: i8042: PNP: No PS/2 controller found. Feb 9 21:06:42.585939 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 21:06:42.585978 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 21:06:42.586016 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T21:06:41 UTC (1707512801) Feb 9 21:06:42.586054 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 21:06:42.586061 kernel: fail to initialize ptp_kvm Feb 9 21:06:42.586067 kernel: intel_pstate: Intel P-state driver initializing Feb 9 21:06:42.586072 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 21:06:42.586077 kernel: intel_pstate: HWP enabled Feb 9 21:06:42.586083 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 21:06:42.586089 kernel: vesafb: scrolling: redraw Feb 9 21:06:42.586095 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 21:06:42.586100 kernel: vesafb: framebuffer at 0x95000000, mapped to 0x0000000063fb0a98, using 768k, total 768k Feb 9 21:06:42.586105 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 21:06:42.586111 kernel: fb0: VESA VGA frame buffer device Feb 9 21:06:42.586116 kernel: NET: Registered PF_INET6 protocol family Feb 9 21:06:42.586121 kernel: Segment Routing with IPv6 Feb 9 21:06:42.586126 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 21:06:42.586132 kernel: NET: Registered PF_PACKET protocol family Feb 9 21:06:42.586138 kernel: Key type dns_resolver registered Feb 9 21:06:42.586143 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 21:06:42.586149 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 21:06:42.586154 kernel: IPI shorthand broadcast: enabled Feb 9 21:06:42.586159 kernel: sched_clock: Marking stable (2323835165, 1355229462)->(4627083463, -948018836) Feb 9 21:06:42.586164 kernel: registered taskstats version 1 Feb 9 21:06:42.586170 kernel: Loading compiled-in X.509 certificates Feb 9 21:06:42.586175 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 21:06:42.586180 kernel: Key type .fscrypt registered Feb 9 21:06:42.586186 kernel: Key type fscrypt-provisioning registered Feb 9 21:06:42.586192 kernel: pstore: Using crash dump compression: deflate Feb 9 21:06:42.586197 kernel: ima: Allocated hash algorithm: sha1 Feb 9 21:06:42.586202 kernel: ima: No architecture policies found Feb 9 21:06:42.586207 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 21:06:42.586213 kernel: Write protecting the kernel read-only data: 28672k Feb 9 21:06:42.586218 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 21:06:42.586223 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 21:06:42.586229 kernel: Run /init as init process Feb 9 21:06:42.586235 kernel: with arguments: Feb 9 21:06:42.586240 kernel: /init Feb 9 21:06:42.586245 kernel: with environment: Feb 9 21:06:42.586250 kernel: HOME=/ Feb 9 21:06:42.586256 kernel: TERM=linux Feb 9 21:06:42.586261 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 21:06:42.586267 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 21:06:42.586275 systemd[1]: Detected architecture x86-64. Feb 9 21:06:42.586281 systemd[1]: Running in initrd. Feb 9 21:06:42.586287 systemd[1]: No hostname configured, using default hostname. Feb 9 21:06:42.586292 systemd[1]: Hostname set to . Feb 9 21:06:42.586297 systemd[1]: Initializing machine ID from random generator. Feb 9 21:06:42.586303 systemd[1]: Queued start job for default target initrd.target. Feb 9 21:06:42.586309 systemd[1]: Started systemd-ask-password-console.path. Feb 9 21:06:42.586314 systemd[1]: Reached target cryptsetup.target. Feb 9 21:06:42.586320 systemd[1]: Reached target ignition-diskful-subsequent.target. Feb 9 21:06:42.586326 systemd[1]: Reached target paths.target. Feb 9 21:06:42.586331 systemd[1]: Reached target slices.target. Feb 9 21:06:42.586336 systemd[1]: Reached target swap.target. Feb 9 21:06:42.586342 systemd[1]: Reached target timers.target. Feb 9 21:06:42.586348 systemd[1]: Listening on iscsid.socket. Feb 9 21:06:42.586353 systemd[1]: Listening on iscsiuio.socket. Feb 9 21:06:42.586359 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 21:06:42.586365 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 21:06:42.586371 kernel: tsc: Refined TSC clocksource calibration: 3408.048 MHz Feb 9 21:06:42.586376 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x3120012af8c, max_idle_ns: 440795298202 ns Feb 9 21:06:42.586382 systemd[1]: Listening on systemd-journald.socket. Feb 9 21:06:42.586387 kernel: clocksource: Switched to clocksource tsc Feb 9 21:06:42.586393 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 21:06:42.586398 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 21:06:42.586404 systemd[1]: Reached target sockets.target. Feb 9 21:06:42.586409 systemd[1]: Starting iscsiuio.service... Feb 9 21:06:42.586416 systemd[1]: Starting kmod-static-nodes.service... Feb 9 21:06:42.586421 kernel: SCSI subsystem initialized Feb 9 21:06:42.586427 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 21:06:42.586432 kernel: Loading iSCSI transport class v2.0-870. Feb 9 21:06:42.586438 systemd[1]: Starting systemd-journald.service... Feb 9 21:06:42.586443 systemd[1]: Starting systemd-modules-load.service... Feb 9 21:06:42.586453 systemd-journald[267]: Journal started Feb 9 21:06:42.586481 systemd-journald[267]: Runtime Journal (/run/log/journal/bbe78033e4114899998396056427d2b3) is 8.0M, max 639.3M, 631.3M free. Feb 9 21:06:42.589210 systemd-modules-load[268]: Inserted module 'overlay' Feb 9 21:06:42.612789 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 21:06:42.646452 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 21:06:42.662492 kernel: Bridge firewalling registered Feb 9 21:06:42.662522 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 9 21:06:42.682451 systemd[1]: Started iscsiuio.service. Feb 9 21:06:42.731491 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 21:06:42.731507 kernel: device-mapper: uevent: version 1.0.3 Feb 9 21:06:42.751526 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 21:06:42.753779 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 9 21:06:42.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:42.796492 kernel: audit: type=1130 audit(1707512802.754:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:42.796511 systemd[1]: Started systemd-journald.service. Feb 9 21:06:42.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:42.821851 systemd[1]: Finished kmod-static-nodes.service. Feb 9 21:06:42.915265 kernel: audit: type=1130 audit(1707512802.820:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:42.915281 kernel: audit: type=1130 audit(1707512802.871:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:42.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:42.872818 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 21:06:42.966588 kernel: audit: type=1130 audit(1707512802.922:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:42.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:42.923724 systemd[1]: Finished systemd-modules-load.service. Feb 9 21:06:43.019512 kernel: audit: type=1130 audit(1707512802.973:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:42.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:42.974730 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 21:06:43.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:43.028154 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 21:06:43.073897 systemd[1]: Starting systemd-sysctl.service... Feb 9 21:06:43.074195 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 21:06:43.074518 kernel: audit: type=1130 audit(1707512803.026:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:43.077109 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 21:06:43.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:43.077923 systemd[1]: Finished systemd-sysctl.service. Feb 9 21:06:43.126653 kernel: audit: type=1130 audit(1707512803.075:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:43.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:43.138788 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 21:06:43.245146 kernel: audit: type=1130 audit(1707512803.137:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:43.245161 kernel: audit: type=1130 audit(1707512803.194:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:43.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:43.196041 systemd[1]: Starting dracut-cmdline.service... Feb 9 21:06:43.276559 kernel: iscsi: registered transport (tcp) Feb 9 21:06:43.276571 dracut-cmdline[291]: dracut-dracut-053 Feb 9 21:06:43.276571 dracut-cmdline[291]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 21:06:43.276571 dracut-cmdline[291]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 21:06:43.348711 kernel: iscsi: registered transport (qla4xxx) Feb 9 21:06:43.348726 kernel: QLogic iSCSI HBA Driver Feb 9 21:06:43.336698 systemd[1]: Finished dracut-cmdline.service. Feb 9 21:06:43.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:43.375369 systemd[1]: Starting dracut-pre-udev.service... Feb 9 21:06:43.389014 systemd[1]: Starting iscsid.service... Feb 9 21:06:43.403692 systemd[1]: Started iscsid.service. Feb 9 21:06:43.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:43.427937 iscsid[446]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 21:06:43.427937 iscsid[446]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 21:06:43.427937 iscsid[446]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 21:06:43.427937 iscsid[446]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 21:06:43.427937 iscsid[446]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 21:06:43.427937 iscsid[446]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 21:06:43.427937 iscsid[446]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 21:06:43.579558 kernel: raid6: avx2x4 gen() 23250 MB/s Feb 9 21:06:43.579573 kernel: raid6: avx2x4 xor() 20080 MB/s Feb 9 21:06:43.579580 kernel: raid6: avx2x2 gen() 52334 MB/s Feb 9 21:06:43.579587 kernel: raid6: avx2x2 xor() 32024 MB/s Feb 9 21:06:43.579594 kernel: raid6: avx2x1 gen() 45068 MB/s Feb 9 21:06:43.622527 kernel: raid6: avx2x1 xor() 27924 MB/s Feb 9 21:06:43.657527 kernel: raid6: sse2x4 gen() 21345 MB/s Feb 9 21:06:43.692528 kernel: raid6: sse2x4 xor() 11984 MB/s Feb 9 21:06:43.726451 kernel: raid6: sse2x2 gen() 21667 MB/s Feb 9 21:06:43.760451 kernel: raid6: sse2x2 xor() 13462 MB/s Feb 9 21:06:43.794451 kernel: raid6: sse2x1 gen() 18325 MB/s Feb 9 21:06:43.846902 kernel: raid6: sse2x1 xor() 8928 MB/s Feb 9 21:06:43.846917 kernel: raid6: using algorithm avx2x2 gen() 52334 MB/s Feb 9 21:06:43.846925 kernel: raid6: .... xor() 32024 MB/s, rmw enabled Feb 9 21:06:43.865209 kernel: raid6: using avx2x2 recovery algorithm Feb 9 21:06:43.911486 kernel: xor: automatically using best checksumming function avx Feb 9 21:06:43.991498 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 21:06:43.995997 systemd[1]: Finished dracut-pre-udev.service. Feb 9 21:06:44.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:44.003000 audit: BPF prog-id=6 op=LOAD Feb 9 21:06:44.003000 audit: BPF prog-id=7 op=LOAD Feb 9 21:06:44.005458 systemd[1]: Starting systemd-udevd.service... Feb 9 21:06:44.013606 systemd-udevd[471]: Using default interface naming scheme 'v252'. Feb 9 21:06:44.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:44.018688 systemd[1]: Started systemd-udevd.service. Feb 9 21:06:44.057561 dracut-pre-trigger[483]: rd.md=0: removing MD RAID activation Feb 9 21:06:44.035488 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 21:06:44.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:44.061399 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 21:06:44.076242 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 21:06:44.124912 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 21:06:44.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:44.150459 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 21:06:44.137733 systemd[1]: Starting dracut-initqueue.service... Feb 9 21:06:44.237722 kernel: ACPI: bus type USB registered Feb 9 21:06:44.237740 kernel: usbcore: registered new interface driver usbfs Feb 9 21:06:44.237749 kernel: usbcore: registered new interface driver hub Feb 9 21:06:44.237757 kernel: usbcore: registered new device driver usb Feb 9 21:06:44.237765 kernel: libata version 3.00 loaded. Feb 9 21:06:44.237777 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 21:06:44.250453 kernel: AES CTR mode by8 optimization enabled Feb 9 21:06:44.250471 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 21:06:44.250541 kernel: mlx5_core 0000:02:00.0: firmware version: 14.29.2002 Feb 9 21:06:44.250597 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 21:06:44.309450 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 21:06:44.324451 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 9 21:06:44.324534 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 21:06:44.382686 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 21:06:44.382767 kernel: pps pps0: new PPS source ptp0 Feb 9 21:06:44.413590 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 9 21:06:44.413665 kernel: scsi host0: ahci Feb 9 21:06:44.413684 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 21:06:44.444546 kernel: scsi host1: ahci Feb 9 21:06:44.444569 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1d:56 Feb 9 21:06:44.474780 kernel: scsi host2: ahci Feb 9 21:06:44.487389 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 9 21:06:44.487465 kernel: scsi host3: ahci Feb 9 21:06:44.495484 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 21:06:44.515486 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 21:06:44.515573 kernel: scsi host4: ahci Feb 9 21:06:44.568510 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 21:06:44.568583 kernel: scsi host5: ahci Feb 9 21:06:44.568601 kernel: pps pps1: new PPS source ptp2 Feb 9 21:06:44.568658 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 9 21:06:44.568714 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 21:06:44.568765 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1d:57 Feb 9 21:06:44.568815 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 9 21:06:44.568864 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 21:06:44.573918 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 21:06:44.585452 kernel: scsi host6: ahci Feb 9 21:06:44.585474 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 9 21:06:44.623765 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 21:06:44.623842 kernel: scsi host7: ahci Feb 9 21:06:44.638926 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 21:06:44.638994 kernel: ata1: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516100 irq 129 Feb 9 21:06:44.652115 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 21:06:44.667968 kernel: ata2: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516180 irq 129 Feb 9 21:06:44.683898 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 21:06:44.695236 kernel: hub 1-0:1.0: USB hub found Feb 9 21:06:44.695316 kernel: ata3: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516200 irq 129 Feb 9 21:06:44.727108 kernel: hub 1-0:1.0: 16 ports detected Feb 9 21:06:44.727180 kernel: ata4: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516280 irq 129 Feb 9 21:06:44.770781 kernel: hub 2-0:1.0: USB hub found Feb 9 21:06:44.770858 kernel: ata5: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516300 irq 129 Feb 9 21:06:44.770869 kernel: hub 2-0:1.0: 10 ports detected Feb 9 21:06:44.788054 kernel: ata6: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516380 irq 129 Feb 9 21:06:44.822890 kernel: usb: port power management may be unreliable Feb 9 21:06:44.822905 kernel: ata7: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516400 irq 129 Feb 9 21:06:45.013054 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 21:06:45.013080 kernel: ata8: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516480 irq 129 Feb 9 21:06:45.054637 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 9 21:06:45.089488 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 21:06:45.190221 kernel: hub 1-14:1.0: USB hub found Feb 9 21:06:45.190378 kernel: hub 1-14:1.0: 4 ports detected Feb 9 21:06:45.315622 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 21:06:45.361116 kernel: mlx5_core 0000:02:00.1: firmware version: 14.29.2002 Feb 9 21:06:45.361234 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 21:06:45.361242 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 21:06:45.361296 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 21:06:45.398451 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 21:06:45.415449 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 9 21:06:45.432478 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 21:06:45.448477 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 21:06:45.464484 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 21:06:45.481492 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 21:06:45.481507 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 21:06:45.497491 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 21:06:45.532454 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 21:06:45.584243 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 21:06:45.584274 kernel: ata1.00: Features: NCQ-prio Feb 9 21:06:45.584291 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 21:06:45.616012 kernel: ata2.00: Features: NCQ-prio Feb 9 21:06:45.635460 kernel: ata1.00: configured for UDMA/133 Feb 9 21:06:45.635537 kernel: ata2.00: configured for UDMA/133 Feb 9 21:06:45.649456 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 21:06:45.649518 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 21:06:45.669450 kernel: port_module: 9 callbacks suppressed Feb 9 21:06:45.669466 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 9 21:06:45.689365 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 21:06:45.704479 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 21:06:45.704494 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 21:06:45.812145 kernel: usbcore: registered new interface driver usbhid Feb 9 21:06:45.812164 kernel: usbhid: USB HID core driver Feb 9 21:06:45.812453 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:06:45.827579 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 21:06:45.842498 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 21:06:45.842581 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 21:06:45.877984 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 21:06:45.878060 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 21:06:45.893205 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 21:06:45.893286 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 21:06:45.893347 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 21:06:45.908345 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 21:06:45.927626 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 21:06:45.927700 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 21:06:45.942267 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 21:06:45.945511 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 21:06:45.945593 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 21:06:45.945603 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 21:06:46.123661 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:06:46.123676 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 21:06:46.144491 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 21:06:46.144528 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 21:06:46.176306 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:06:46.192012 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 21:06:46.208481 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 21:06:46.223546 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 21:06:46.259506 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth1 Feb 9 21:06:46.281103 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 21:06:46.314789 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth0 Feb 9 21:06:46.315190 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sda6 scanned by (udev-worker) (522) Feb 9 21:06:46.314706 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 21:06:46.333230 systemd[1]: Finished dracut-initqueue.service. Feb 9 21:06:46.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.385529 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 21:06:46.422622 kernel: audit: type=1130 audit(1707512806.353:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.420538 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 21:06:46.432035 systemd[1]: Reached target initrd-root-device.target. Feb 9 21:06:46.455678 systemd[1]: Reached target remote-fs-pre.target. Feb 9 21:06:46.463542 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 21:06:46.463671 systemd[1]: Reached target remote-fs.target. Feb 9 21:06:46.487367 systemd[1]: Starting disk-uuid.service... Feb 9 21:06:46.502127 systemd[1]: Starting dracut-pre-mount.service... Feb 9 21:06:46.626869 kernel: audit: type=1130 audit(1707512806.527:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.626883 kernel: audit: type=1131 audit(1707512806.527:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.515159 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 21:06:46.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.515334 systemd[1]: Finished disk-uuid.service. Feb 9 21:06:46.705694 kernel: audit: type=1130 audit(1707512806.634:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.529162 systemd[1]: Finished dracut-pre-mount.service. Feb 9 21:06:46.635738 systemd[1]: Reached target local-fs-pre.target. Feb 9 21:06:46.691655 systemd[1]: Reached target local-fs.target. Feb 9 21:06:46.691764 systemd[1]: Reached target sysinit.target. Feb 9 21:06:46.714556 systemd[1]: Reached target basic.target. Feb 9 21:06:46.728252 systemd[1]: Starting systemd-fsck-root.service... Feb 9 21:06:46.742293 systemd[1]: Starting verity-setup.service... Feb 9 21:06:46.755779 systemd-fsck[711]: ROOT: clean, 628/553520 files, 56037/553472 blocks Feb 9 21:06:46.792494 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 21:06:46.781858 systemd[1]: Finished systemd-fsck-root.service. Feb 9 21:06:46.857557 kernel: audit: type=1130 audit(1707512806.800:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.802349 systemd[1]: Mounting sysroot.mount... Feb 9 21:06:46.865682 systemd[1]: Found device dev-mapper-usr.device. Feb 9 21:06:46.879668 systemd[1]: Finished verity-setup.service. Feb 9 21:06:46.967185 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 21:06:46.967200 kernel: audit: type=1130 audit(1707512806.916:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:46.918045 systemd[1]: Mounted sysroot.mount. Feb 9 21:06:46.974712 systemd[1]: Reached target initrd-root-fs.target. Feb 9 21:06:46.982130 systemd[1]: Mounting sysusr-usr.mount... Feb 9 21:06:47.034666 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 21:06:47.027101 systemd[1]: Mounted sysusr-usr.mount. Feb 9 21:06:47.042338 systemd[1]: Mounting sysroot-usr.mount... Feb 9 21:06:47.056268 systemd[1]: Mounted sysroot-usr.mount. Feb 9 21:06:47.071902 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 21:06:47.169963 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 21:06:47.169981 kernel: BTRFS info (device sda6): using free space tree Feb 9 21:06:47.169989 kernel: BTRFS info (device sda6): has skinny extents Feb 9 21:06:47.169996 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 21:06:47.090636 systemd[1]: Starting initrd-setup-root.service... Feb 9 21:06:47.177738 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 21:06:47.193833 systemd[1]: Finished initrd-setup-root.service. Feb 9 21:06:47.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.231289 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 21:06:47.279727 kernel: audit: type=1130 audit(1707512807.209:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.269820 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 21:06:47.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.346478 kernel: audit: type=1130 audit(1707512807.288:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.346491 initrd-setup-root-after-ignition[806]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 21:06:47.289999 systemd[1]: Reached target ignition-subsequent.target. Feb 9 21:06:47.355082 systemd[1]: Starting initrd-parse-etc.service... Feb 9 21:06:47.398346 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 21:06:47.398560 systemd[1]: Finished initrd-parse-etc.service. Feb 9 21:06:47.476501 kernel: audit: type=1130 audit(1707512807.413:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.414934 systemd[1]: Reached target initrd-fs.target. Feb 9 21:06:47.484631 systemd[1]: Reached target initrd.target. Feb 9 21:06:47.484697 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 21:06:47.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.485083 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 21:06:47.497754 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 21:06:47.519273 systemd[1]: Starting initrd-cleanup.service... Feb 9 21:06:47.543332 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 21:06:47.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.554020 systemd[1]: Stopped target timers.target. Feb 9 21:06:47.568034 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 21:06:47.568340 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 21:06:47.584373 systemd[1]: Stopped target initrd.target. Feb 9 21:06:47.599105 systemd[1]: Stopped target basic.target. Feb 9 21:06:47.613108 systemd[1]: Stopped target ignition-subsequent.target. Feb 9 21:06:47.630102 systemd[1]: Stopped target ignition-diskful-subsequent.target. Feb 9 21:06:47.647105 systemd[1]: Stopped target initrd-root-device.target. Feb 9 21:06:47.663075 systemd[1]: Stopped target paths.target. Feb 9 21:06:47.677104 systemd[1]: Stopped target remote-fs.target. Feb 9 21:06:47.693104 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 21:06:47.710100 systemd[1]: Stopped target slices.target. Feb 9 21:06:47.725068 systemd[1]: Stopped target sockets.target. Feb 9 21:06:47.741098 systemd[1]: Stopped target sysinit.target. Feb 9 21:06:47.757118 systemd[1]: Stopped target local-fs.target. Feb 9 21:06:47.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.774075 systemd[1]: Stopped target local-fs-pre.target. Feb 9 21:06:47.790103 systemd[1]: Stopped target swap.target. Feb 9 21:06:47.804030 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 21:06:47.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.804352 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 21:06:47.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.819303 systemd[1]: Stopped target cryptsetup.target. Feb 9 21:06:47.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.905913 iscsid[446]: iscsid shutting down. Feb 9 21:06:47.834994 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 21:06:47.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.838675 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 21:06:47.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.849981 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 21:06:47.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.850308 systemd[1]: Stopped dracut-initqueue.service. Feb 9 21:06:47.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.866176 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 21:06:47.866523 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 21:06:47.884180 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 21:06:48.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.884514 systemd[1]: Stopped initrd-setup-root.service. Feb 9 21:06:48.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.899507 systemd[1]: Stopping iscsid.service... Feb 9 21:06:47.912664 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 21:06:47.913008 systemd[1]: Stopped systemd-sysctl.service. Feb 9 21:06:47.928206 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 21:06:48.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.928546 systemd[1]: Stopped systemd-modules-load.service. Feb 9 21:06:48.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.946048 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 21:06:48.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.946362 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 21:06:47.963088 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 21:06:48.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.963402 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 21:06:48.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.980429 systemd[1]: Stopping systemd-udevd.service... Feb 9 21:06:48.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.988860 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 21:06:48.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.989231 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 21:06:48.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:48.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:47.989278 systemd[1]: Stopped iscsid.service. Feb 9 21:06:48.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:48.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:48.017905 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 21:06:48.017996 systemd[1]: Stopped systemd-udevd.service. Feb 9 21:06:48.037128 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 21:06:48.037270 systemd[1]: Closed iscsid.socket. Feb 9 21:06:48.049725 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 21:06:48.049814 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 21:06:48.065726 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 21:06:48.065812 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 21:06:48.081728 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 21:06:48.081864 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 21:06:48.096989 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 21:06:48.097125 systemd[1]: Stopped dracut-cmdline.service. Feb 9 21:06:48.114855 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 21:06:48.114986 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 21:06:48.134406 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 21:06:48.151673 systemd[1]: Stopping iscsiuio.service... Feb 9 21:06:48.158619 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 21:06:48.158653 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 21:06:48.173764 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 21:06:48.173816 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 21:06:48.191770 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 21:06:48.191854 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 21:06:48.210099 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 21:06:48.211278 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 21:06:48.211503 systemd[1]: Stopped iscsiuio.service. Feb 9 21:06:48.222282 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 21:06:48.222497 systemd[1]: Finished initrd-cleanup.service. Feb 9 21:06:48.242323 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 21:06:48.242555 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 21:06:48.259759 systemd[1]: Reached target initrd-switch-root.target. Feb 9 21:06:48.272694 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 21:06:48.272794 systemd[1]: Closed iscsiuio.socket. Feb 9 21:06:48.357478 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 9 21:06:48.290165 systemd[1]: Starting initrd-switch-root.service... Feb 9 21:06:48.311217 systemd[1]: Switching root. Feb 9 21:06:48.357551 systemd-journald[267]: Journal stopped Feb 9 21:06:52.391777 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 21:06:52.391792 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 21:06:52.391799 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 21:06:52.391804 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 21:06:52.391809 kernel: SELinux: policy capability open_perms=1 Feb 9 21:06:52.391814 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 21:06:52.391821 kernel: SELinux: policy capability always_check_network=0 Feb 9 21:06:52.391827 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 21:06:52.391833 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 21:06:52.391838 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 21:06:52.391843 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 21:06:52.391849 systemd[1]: Successfully loaded SELinux policy in 286.944ms. Feb 9 21:06:52.391856 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.666ms. Feb 9 21:06:52.391862 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 21:06:52.391870 systemd[1]: Detected architecture x86-64. Feb 9 21:06:52.391876 systemd[1]: Detected first boot. Feb 9 21:06:52.391882 systemd[1]: Hostname set to . Feb 9 21:06:52.391888 systemd[1]: Initializing machine ID from random generator. Feb 9 21:06:52.391894 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 21:06:52.391901 systemd[1]: Populated /etc with preset unit settings. Feb 9 21:06:52.391907 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 21:06:52.391913 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 21:06:52.391920 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 21:06:52.391926 kernel: kauditd_printk_skb: 41 callbacks suppressed Feb 9 21:06:52.391932 kernel: audit: type=1334 audit(1707512810.721:62): prog-id=10 op=LOAD Feb 9 21:06:52.391938 kernel: audit: type=1334 audit(1707512810.721:63): prog-id=3 op=UNLOAD Feb 9 21:06:52.391944 kernel: audit: type=1334 audit(1707512810.763:64): prog-id=11 op=LOAD Feb 9 21:06:52.391950 kernel: audit: type=1334 audit(1707512810.806:65): prog-id=12 op=LOAD Feb 9 21:06:52.391955 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 21:06:52.391961 kernel: audit: type=1334 audit(1707512810.806:66): prog-id=4 op=UNLOAD Feb 9 21:06:52.391967 systemd[1]: Stopped initrd-switch-root.service. Feb 9 21:06:52.391973 kernel: audit: type=1334 audit(1707512810.806:67): prog-id=5 op=UNLOAD Feb 9 21:06:52.391978 kernel: audit: type=1131 audit(1707512810.806:68): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.391984 kernel: audit: type=1130 audit(1707512810.964:69): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.391991 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 21:06:52.391998 kernel: audit: type=1131 audit(1707512810.964:70): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.392003 kernel: audit: type=1334 audit(1707512811.089:71): prog-id=10 op=UNLOAD Feb 9 21:06:52.392009 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 21:06:52.392015 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 21:06:52.392021 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 21:06:52.392029 systemd[1]: Created slice system-getty.slice. Feb 9 21:06:52.392036 systemd[1]: Created slice system-modprobe.slice. Feb 9 21:06:52.392043 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 21:06:52.392049 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 21:06:52.392056 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 21:06:52.392062 systemd[1]: Created slice user.slice. Feb 9 21:06:52.392068 systemd[1]: Started systemd-ask-password-console.path. Feb 9 21:06:52.392074 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 21:06:52.392081 systemd[1]: Set up automount boot.automount. Feb 9 21:06:52.392087 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 21:06:52.392094 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 21:06:52.392101 systemd[1]: Stopped target initrd-fs.target. Feb 9 21:06:52.392107 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 21:06:52.392113 systemd[1]: Reached target integritysetup.target. Feb 9 21:06:52.392119 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 21:06:52.392126 systemd[1]: Reached target remote-fs.target. Feb 9 21:06:52.392132 systemd[1]: Reached target slices.target. Feb 9 21:06:52.392139 systemd[1]: Reached target swap.target. Feb 9 21:06:52.392145 systemd[1]: Reached target torcx.target. Feb 9 21:06:52.392152 systemd[1]: Reached target veritysetup.target. Feb 9 21:06:52.392158 systemd[1]: Listening on systemd-coredump.socket. Feb 9 21:06:52.392164 systemd[1]: Listening on systemd-initctl.socket. Feb 9 21:06:52.392171 systemd[1]: Listening on systemd-networkd.socket. Feb 9 21:06:52.392178 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 21:06:52.392185 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 21:06:52.392192 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 21:06:52.392198 systemd[1]: Mounting dev-hugepages.mount... Feb 9 21:06:52.392205 systemd[1]: Mounting dev-mqueue.mount... Feb 9 21:06:52.392211 systemd[1]: Mounting media.mount... Feb 9 21:06:52.392218 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 21:06:52.392225 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 21:06:52.392232 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 21:06:52.392239 systemd[1]: Mounting tmp.mount... Feb 9 21:06:52.392245 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 21:06:52.392252 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 21:06:52.392258 systemd[1]: Starting kmod-static-nodes.service... Feb 9 21:06:52.392264 systemd[1]: Starting modprobe@configfs.service... Feb 9 21:06:52.392271 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 21:06:52.392277 systemd[1]: Starting modprobe@drm.service... Feb 9 21:06:52.392284 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 21:06:52.392291 systemd[1]: Starting modprobe@fuse.service... Feb 9 21:06:52.392297 kernel: fuse: init (API version 7.34) Feb 9 21:06:52.392303 systemd[1]: Starting modprobe@loop.service... Feb 9 21:06:52.392310 kernel: loop: module loaded Feb 9 21:06:52.392316 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 21:06:52.392323 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 21:06:52.392329 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 21:06:52.392336 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 21:06:52.392342 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 21:06:52.392350 systemd[1]: Stopped systemd-journald.service. Feb 9 21:06:52.392356 systemd[1]: Starting systemd-journald.service... Feb 9 21:06:52.392362 systemd[1]: Starting systemd-modules-load.service... Feb 9 21:06:52.392371 systemd-journald[949]: Journal started Feb 9 21:06:52.392396 systemd-journald[949]: Runtime Journal (/run/log/journal/175a830b8d4842af96670c524cbf0f8f) is 8.0M, max 639.3M, 631.3M free. Feb 9 21:06:48.832000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 21:06:49.089000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 21:06:49.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 21:06:49.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 21:06:49.092000 audit: BPF prog-id=8 op=LOAD Feb 9 21:06:49.092000 audit: BPF prog-id=8 op=UNLOAD Feb 9 21:06:49.092000 audit: BPF prog-id=9 op=LOAD Feb 9 21:06:49.092000 audit: BPF prog-id=9 op=UNLOAD Feb 9 21:06:49.162000 audit[840]: AVC avc: denied { associate } for pid=840 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 21:06:49.162000 audit[840]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001258e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=823 pid=840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:06:49.162000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 21:06:49.188000 audit[840]: AVC avc: denied { associate } for pid=840 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 21:06:49.188000 audit[840]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001259b9 a2=1ed a3=0 items=2 ppid=823 pid=840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:06:49.188000 audit: CWD cwd="/" Feb 9 21:06:49.188000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:49.188000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:49.188000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 21:06:50.721000 audit: BPF prog-id=10 op=LOAD Feb 9 21:06:50.721000 audit: BPF prog-id=3 op=UNLOAD Feb 9 21:06:50.763000 audit: BPF prog-id=11 op=LOAD Feb 9 21:06:50.806000 audit: BPF prog-id=12 op=LOAD Feb 9 21:06:50.806000 audit: BPF prog-id=4 op=UNLOAD Feb 9 21:06:50.806000 audit: BPF prog-id=5 op=UNLOAD Feb 9 21:06:50.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:50.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:50.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:51.089000 audit: BPF prog-id=10 op=UNLOAD Feb 9 21:06:52.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.364000 audit: BPF prog-id=13 op=LOAD Feb 9 21:06:52.364000 audit: BPF prog-id=14 op=LOAD Feb 9 21:06:52.364000 audit: BPF prog-id=15 op=LOAD Feb 9 21:06:52.364000 audit: BPF prog-id=11 op=UNLOAD Feb 9 21:06:52.364000 audit: BPF prog-id=12 op=UNLOAD Feb 9 21:06:52.388000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 21:06:52.388000 audit[949]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc9eb29ff0 a2=4000 a3=7ffc9eb2a08c items=0 ppid=1 pid=949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:06:52.388000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 21:06:50.721318 systemd[1]: Queued start job for default target multi-user.target. Feb 9 21:06:49.161841 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 21:06:50.721325 systemd[1]: Unnecessary job was removed for dev-sda6.device. Feb 9 21:06:49.162319 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 21:06:50.808098 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 21:06:49.162337 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 21:06:49.162362 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 21:06:49.162371 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 21:06:49.162395 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 21:06:49.162406 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 21:06:49.162790 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 21:06:49.162824 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 21:06:49.162836 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 21:06:49.163358 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 21:06:49.163387 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 21:06:49.163403 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 21:06:49.163418 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 21:06:49.163439 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 21:06:49.163454 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 21:06:50.366060 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:06:50.366202 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:06:50.366258 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:06:50.366351 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:06:50.366381 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 21:06:50.366415 /usr/lib/systemd/system-generators/torcx-generator[840]: time="2024-02-09T21:06:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 21:06:52.422635 systemd[1]: Starting systemd-network-generator.service... Feb 9 21:06:52.444481 systemd[1]: Starting systemd-remount-fs.service... Feb 9 21:06:52.465480 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 21:06:52.498997 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 21:06:52.499018 systemd[1]: Stopped verity-setup.service. Feb 9 21:06:52.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.533487 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 21:06:52.548639 systemd[1]: Started systemd-journald.service. Feb 9 21:06:52.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.556968 systemd[1]: Mounted dev-hugepages.mount. Feb 9 21:06:52.563697 systemd[1]: Mounted dev-mqueue.mount. Feb 9 21:06:52.570693 systemd[1]: Mounted media.mount. Feb 9 21:06:52.577693 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 21:06:52.586717 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 21:06:52.595685 systemd[1]: Mounted tmp.mount. Feb 9 21:06:52.602770 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 21:06:52.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.611781 systemd[1]: Finished kmod-static-nodes.service. Feb 9 21:06:52.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.620890 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 21:06:52.621008 systemd[1]: Finished modprobe@configfs.service. Feb 9 21:06:52.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.629883 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 21:06:52.630024 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 21:06:52.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.638987 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 21:06:52.639166 systemd[1]: Finished modprobe@drm.service. Feb 9 21:06:52.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.648115 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 21:06:52.648405 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 21:06:52.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.657277 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 21:06:52.657623 systemd[1]: Finished modprobe@fuse.service. Feb 9 21:06:52.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.666246 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 21:06:52.666694 systemd[1]: Finished modprobe@loop.service. Feb 9 21:06:52.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.675338 systemd[1]: Finished systemd-modules-load.service. Feb 9 21:06:52.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.684322 systemd[1]: Finished systemd-network-generator.service. Feb 9 21:06:52.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.693269 systemd[1]: Finished systemd-remount-fs.service. Feb 9 21:06:52.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.702257 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 21:06:52.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.712009 systemd[1]: Reached target network-pre.target. Feb 9 21:06:52.723291 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 21:06:52.732142 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 21:06:52.740651 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 21:06:52.741724 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 21:06:52.749115 systemd[1]: Starting systemd-journal-flush.service... Feb 9 21:06:52.753090 systemd-journald[949]: Time spent on flushing to /var/log/journal/175a830b8d4842af96670c524cbf0f8f is 13.224ms for 1298 entries. Feb 9 21:06:52.753090 systemd-journald[949]: System Journal (/var/log/journal/175a830b8d4842af96670c524cbf0f8f) is 8.0M, max 195.6M, 187.6M free. Feb 9 21:06:52.785075 systemd-journald[949]: Received client request to flush runtime journal. Feb 9 21:06:52.766558 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 21:06:52.767144 systemd[1]: Starting systemd-random-seed.service... Feb 9 21:06:52.776572 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 21:06:52.777170 systemd[1]: Starting systemd-sysctl.service... Feb 9 21:06:52.784150 systemd[1]: Starting systemd-sysusers.service... Feb 9 21:06:52.791315 systemd[1]: Starting systemd-udev-settle.service... Feb 9 21:06:52.799675 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 21:06:52.807639 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 21:06:52.815683 systemd[1]: Finished systemd-journal-flush.service. Feb 9 21:06:52.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.823660 systemd[1]: Finished systemd-random-seed.service. Feb 9 21:06:52.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.831651 systemd[1]: Finished systemd-sysctl.service. Feb 9 21:06:52.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.839643 systemd[1]: Finished systemd-sysusers.service. Feb 9 21:06:52.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:52.848619 systemd[1]: Reached target first-boot-complete.target. Feb 9 21:06:52.857193 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 21:06:52.866642 udevadm[965]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 21:06:52.876575 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 21:06:52.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:53.059416 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 21:06:53.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:53.066000 audit: BPF prog-id=16 op=LOAD Feb 9 21:06:53.067000 audit: BPF prog-id=17 op=LOAD Feb 9 21:06:53.067000 audit: BPF prog-id=6 op=UNLOAD Feb 9 21:06:53.067000 audit: BPF prog-id=7 op=UNLOAD Feb 9 21:06:53.068836 systemd[1]: Starting systemd-udevd.service... Feb 9 21:06:53.080735 systemd-udevd[968]: Using default interface naming scheme 'v252'. Feb 9 21:06:53.099283 systemd[1]: Started systemd-udevd.service. Feb 9 21:06:53.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:53.110675 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 21:06:53.110000 audit: BPF prog-id=18 op=LOAD Feb 9 21:06:53.128804 systemd[1]: Starting systemd-networkd.service... Feb 9 21:06:53.141760 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 21:06:53.141821 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 21:06:53.159613 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 21:06:53.159661 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 21:06:53.165741 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 21:06:53.174510 kernel: ACPI: button: Power Button [PWRF] Feb 9 21:06:53.189009 kernel: IPMI message handler: version 39.2 Feb 9 21:06:53.201000 audit: BPF prog-id=19 op=LOAD Feb 9 21:06:53.201000 audit: BPF prog-id=20 op=LOAD Feb 9 21:06:53.201000 audit: BPF prog-id=21 op=LOAD Feb 9 21:06:53.204266 systemd[1]: Starting systemd-userdbd.service... Feb 9 21:06:53.248797 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 21:06:53.249019 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 21:06:53.154000 audit[1046]: AVC avc: denied { confidentiality } for pid=1046 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 21:06:53.251950 systemd[1]: Started systemd-userdbd.service. Feb 9 21:06:53.265524 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 21:06:53.154000 audit[1046]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe261c9b010 a1=4d8bc a2=7fe263953bc5 a3=5 items=42 ppid=968 pid=1046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:06:53.154000 audit: CWD cwd="/" Feb 9 21:06:53.154000 audit: PATH item=0 name=(null) inode=1039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=1 name=(null) inode=21335 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=2 name=(null) inode=21335 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=3 name=(null) inode=21336 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=4 name=(null) inode=21335 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=5 name=(null) inode=21337 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=6 name=(null) inode=21335 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=7 name=(null) inode=21338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=8 name=(null) inode=21338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=9 name=(null) inode=21339 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=10 name=(null) inode=21338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=11 name=(null) inode=21340 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=12 name=(null) inode=21338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=13 name=(null) inode=21341 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=14 name=(null) inode=21338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=15 name=(null) inode=21342 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=16 name=(null) inode=21338 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=17 name=(null) inode=21343 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=18 name=(null) inode=21335 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=19 name=(null) inode=21344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=20 name=(null) inode=21344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=21 name=(null) inode=21345 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=22 name=(null) inode=21344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=23 name=(null) inode=21346 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=24 name=(null) inode=21344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=25 name=(null) inode=21347 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=26 name=(null) inode=21344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=27 name=(null) inode=21348 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=28 name=(null) inode=21344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=29 name=(null) inode=21349 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=30 name=(null) inode=21335 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=31 name=(null) inode=21350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=32 name=(null) inode=21350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=33 name=(null) inode=21351 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=34 name=(null) inode=21350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=35 name=(null) inode=21352 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=36 name=(null) inode=21350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=37 name=(null) inode=21353 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=38 name=(null) inode=21350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=39 name=(null) inode=21354 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=40 name=(null) inode=21350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PATH item=41 name=(null) inode=21355 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:06:53.154000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 21:06:53.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:53.284457 kernel: ipmi device interface Feb 9 21:06:53.303457 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 21:06:53.318459 kernel: ipmi_si: IPMI System Interface driver Feb 9 21:06:53.318515 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 21:06:53.318624 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 21:06:53.318708 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 21:06:53.318777 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 21:06:53.318790 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 21:06:53.318801 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 21:06:53.318877 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 21:06:53.474124 systemd-networkd[1029]: bond0: netdev ready Feb 9 21:06:53.476170 systemd-networkd[1029]: lo: Link UP Feb 9 21:06:53.476173 systemd-networkd[1029]: lo: Gained carrier Feb 9 21:06:53.476488 systemd-networkd[1029]: Enumeration completed Feb 9 21:06:53.476552 systemd[1]: Started systemd-networkd.service. Feb 9 21:06:53.476760 systemd-networkd[1029]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 21:06:53.477410 systemd-networkd[1029]: enp2s0f1np1: Configuring with /etc/systemd/network/10-b8:ce:f6:07:a6:7b.network. Feb 9 21:06:53.483535 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 21:06:53.483628 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 21:06:53.483641 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 21:06:53.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:53.502269 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 21:06:53.523451 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 9 21:06:53.523538 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 21:06:53.606131 kernel: intel_rapl_common: Found RAPL domain package Feb 9 21:06:53.606180 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 9 21:06:53.606288 kernel: intel_rapl_common: Found RAPL domain core Feb 9 21:06:53.638565 kernel: intel_rapl_common: Found RAPL domain uncore Feb 9 21:06:53.638588 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 21:06:53.654089 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 21:06:53.670457 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 21:06:53.685524 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 9 21:06:53.685547 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 21:06:53.704050 systemd-networkd[1029]: enp2s0f0np0: Configuring with /etc/systemd/network/10-b8:ce:f6:07:a6:7a.network. Feb 9 21:06:53.741452 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 21:06:53.860509 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 21:06:53.931489 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 21:06:53.955544 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 9 21:06:53.975456 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 21:06:53.986151 systemd-networkd[1029]: bond0: Link UP Feb 9 21:06:53.986402 systemd-networkd[1029]: enp2s0f1np1: Link UP Feb 9 21:06:53.986601 systemd-networkd[1029]: enp2s0f0np0: Link UP Feb 9 21:06:53.986736 systemd-networkd[1029]: enp2s0f1np1: Gained carrier Feb 9 21:06:53.987898 systemd-networkd[1029]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-b8:ce:f6:07:a6:7a.network. Feb 9 21:06:54.024892 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 21:06:54.024920 kernel: bond0: active interface up! Feb 9 21:06:54.050502 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 21:06:54.074715 systemd[1]: Finished systemd-udev-settle.service. Feb 9 21:06:54.092451 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 21:06:54.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:54.101185 systemd[1]: Starting lvm2-activation-early.service... Feb 9 21:06:54.116528 lvm[1079]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 21:06:54.149884 systemd[1]: Finished lvm2-activation-early.service. Feb 9 21:06:54.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:54.166217 systemd[1]: Reached target cryptsetup.target. Feb 9 21:06:54.178451 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.201449 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.212903 systemd[1]: Starting lvm2-activation.service... Feb 9 21:06:54.214980 lvm[1080]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 21:06:54.223451 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.246456 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.268450 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.289478 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.290849 systemd[1]: Finished lvm2-activation.service. Feb 9 21:06:54.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:54.307571 systemd[1]: Reached target local-fs-pre.target. Feb 9 21:06:54.311450 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.327532 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 21:06:54.327548 systemd[1]: Reached target local-fs.target. Feb 9 21:06:54.332449 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.349532 systemd[1]: Reached target machines.target. Feb 9 21:06:54.352449 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.369112 systemd[1]: Starting ldconfig.service... Feb 9 21:06:54.373449 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.394450 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.404748 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 21:06:54.404769 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 21:06:54.405332 systemd[1]: Starting systemd-boot-update.service... Feb 9 21:06:54.414517 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.435516 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.446290 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 21:06:54.455502 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.455435 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 21:06:54.455570 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 21:06:54.455596 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 21:06:54.456084 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 21:06:54.456290 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1082 (bootctl) Feb 9 21:06:54.456977 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 21:06:54.465797 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 21:06:54.469946 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 21:06:54.470984 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 21:06:54.475451 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.495500 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.495603 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 21:06:54.495927 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 21:06:54.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:54.514410 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 21:06:54.514449 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:54.515503 systemd-networkd[1029]: bond0: Gained carrier Feb 9 21:06:54.515738 systemd-networkd[1029]: enp2s0f0np0: Gained carrier Feb 9 21:06:54.548501 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:06:54.548533 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 9 21:06:54.567775 systemd-networkd[1029]: enp2s0f1np1: Link DOWN Feb 9 21:06:54.567777 systemd-networkd[1029]: enp2s0f1np1: Lost carrier Feb 9 21:06:54.574043 systemd-fsck[1090]: fsck.fat 4.2 (2021-01-31) Feb 9 21:06:54.574043 systemd-fsck[1090]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 21:06:54.574775 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 21:06:54.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:54.587504 systemd[1]: Mounting boot.mount... Feb 9 21:06:54.609999 systemd[1]: Mounted boot.mount. Feb 9 21:06:54.629041 systemd[1]: Finished systemd-boot-update.service. Feb 9 21:06:54.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:54.668647 ldconfig[1081]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 21:06:54.668935 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 21:06:54.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:54.677669 systemd[1]: Finished ldconfig.service. Feb 9 21:06:54.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:06:54.685298 systemd[1]: Starting audit-rules.service... Feb 9 21:06:54.692078 systemd[1]: Starting clean-ca-certificates.service... Feb 9 21:06:54.701110 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 21:06:54.701000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 21:06:54.701000 audit[1113]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe276d000 a2=420 a3=0 items=0 ppid=1096 pid=1113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:06:54.701000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 21:06:54.703179 augenrules[1113]: No rules Feb 9 21:06:54.710461 systemd[1]: Starting systemd-resolved.service... Feb 9 21:06:54.718576 systemd[1]: Starting systemd-timesyncd.service... Feb 9 21:06:54.727178 systemd[1]: Starting systemd-update-utmp.service... Feb 9 21:06:54.733916 systemd[1]: Finished audit-rules.service. Feb 9 21:06:54.741785 systemd[1]: Finished clean-ca-certificates.service. Feb 9 21:06:54.750755 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 21:06:54.764392 systemd[1]: Finished systemd-update-utmp.service. Feb 9 21:06:54.779561 systemd[1]: Starting systemd-update-done.service... Feb 9 21:06:54.786479 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 21:06:54.786891 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 9 21:06:54.799607 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 21:06:54.800155 systemd[1]: Finished systemd-update-done.service. Feb 9 21:06:54.805496 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Feb 9 21:06:54.820454 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 9 21:06:54.821277 systemd-networkd[1029]: enp2s0f1np1: Link UP Feb 9 21:06:54.821522 systemd-networkd[1029]: enp2s0f1np1: Gained carrier Feb 9 21:06:54.852452 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 21:06:54.875073 systemd[1]: Started systemd-timesyncd.service. Feb 9 21:06:54.877616 systemd-resolved[1118]: Positive Trust Anchors: Feb 9 21:06:54.877622 systemd-resolved[1118]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 21:06:54.877641 systemd-resolved[1118]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 21:06:54.883687 systemd[1]: Reached target time-set.target. Feb 9 21:06:54.894827 systemd-resolved[1118]: Using system hostname 'ci-3510.3.2-a-0925d91232'. Feb 9 21:06:54.895857 systemd[1]: Started systemd-resolved.service. Feb 9 21:06:54.904501 systemd[1]: Reached target network.target. Feb 9 21:06:54.913478 systemd[1]: Reached target nss-lookup.target. Feb 9 21:06:54.922478 systemd[1]: Reached target sysinit.target. Feb 9 21:06:54.931522 systemd[1]: Started motdgen.path. Feb 9 21:06:54.938493 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 21:06:54.948551 systemd[1]: Started logrotate.timer. Feb 9 21:06:54.955516 systemd[1]: Started mdadm.timer. Feb 9 21:06:54.963481 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 21:06:54.971479 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 21:06:54.971495 systemd[1]: Reached target paths.target. Feb 9 21:06:54.978477 systemd[1]: Reached target timers.target. Feb 9 21:06:54.985602 systemd[1]: Listening on dbus.socket. Feb 9 21:06:54.994024 systemd[1]: Starting docker.socket... Feb 9 21:06:55.002792 systemd[1]: Listening on sshd.socket. Feb 9 21:06:55.009538 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 21:06:55.009752 systemd[1]: Listening on docker.socket. Feb 9 21:06:55.016517 systemd[1]: Reached target sockets.target. Feb 9 21:06:55.024477 systemd[1]: Reached target basic.target. Feb 9 21:06:55.031496 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 21:06:55.031511 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 21:06:55.031943 systemd[1]: Starting containerd.service... Feb 9 21:06:55.038878 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 21:06:55.047007 systemd[1]: Starting coreos-metadata.service... Feb 9 21:06:55.053990 systemd[1]: Starting dbus.service... Feb 9 21:06:55.060030 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 21:06:55.065395 jq[1131]: false Feb 9 21:06:55.067178 systemd[1]: Starting extend-filesystems.service... Feb 9 21:06:55.074496 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 21:06:55.075056 systemd[1]: Starting motdgen.service... Feb 9 21:06:55.075393 dbus-daemon[1130]: [system] SELinux support is enabled Feb 9 21:06:55.075873 extend-filesystems[1134]: Found sda Feb 9 21:06:55.096549 extend-filesystems[1134]: Found sda1 Feb 9 21:06:55.096549 extend-filesystems[1134]: Found sda2 Feb 9 21:06:55.096549 extend-filesystems[1134]: Found sda3 Feb 9 21:06:55.096549 extend-filesystems[1134]: Found usr Feb 9 21:06:55.096549 extend-filesystems[1134]: Found sda4 Feb 9 21:06:55.096549 extend-filesystems[1134]: Found sda6 Feb 9 21:06:55.096549 extend-filesystems[1134]: Found sda7 Feb 9 21:06:55.096549 extend-filesystems[1134]: Found sda9 Feb 9 21:06:55.096549 extend-filesystems[1134]: Checking size of /dev/sda9 Feb 9 21:06:55.096549 extend-filesystems[1134]: Resized partition /dev/sda9 Feb 9 21:06:55.218491 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 9 21:06:55.083165 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 21:06:55.218615 coreos-metadata[1126]: Feb 09 21:06:55.097 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 21:06:55.218763 coreos-metadata[1127]: Feb 09 21:06:55.097 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 21:06:55.218878 extend-filesystems[1148]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 21:06:55.116239 systemd[1]: Starting sshd-keygen.service... Feb 9 21:06:55.131950 systemd[1]: Starting systemd-logind.service... Feb 9 21:06:55.146487 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 21:06:55.147097 systemd[1]: Starting tcsd.service... Feb 9 21:06:55.233816 update_engine[1162]: I0209 21:06:55.204453 1162 main.cc:92] Flatcar Update Engine starting Feb 9 21:06:55.233816 update_engine[1162]: I0209 21:06:55.208146 1162 update_check_scheduler.cc:74] Next update check in 8m40s Feb 9 21:06:55.153952 systemd-logind[1160]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 21:06:55.234112 jq[1163]: true Feb 9 21:06:55.153962 systemd-logind[1160]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 21:06:55.153970 systemd-logind[1160]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 21:06:55.154065 systemd-logind[1160]: New seat seat0. Feb 9 21:06:55.159788 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 21:06:55.160135 systemd[1]: Starting update-engine.service... Feb 9 21:06:55.168023 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 21:06:55.191810 systemd[1]: Started dbus.service. Feb 9 21:06:55.212114 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 21:06:55.212200 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 21:06:55.212351 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 21:06:55.212428 systemd[1]: Finished motdgen.service. Feb 9 21:06:55.225641 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 21:06:55.225717 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 21:06:55.244081 jq[1165]: false Feb 9 21:06:55.244257 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Feb 9 21:06:55.244335 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service being skipped. Feb 9 21:06:55.244597 dbus-daemon[1130]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 21:06:55.248386 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 21:06:55.248491 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 21:06:55.250036 systemd[1]: Started update-engine.service. Feb 9 21:06:55.253214 env[1166]: time="2024-02-09T21:06:55.253191572Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 21:06:55.261887 env[1166]: time="2024-02-09T21:06:55.261873931Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 21:06:55.261947 env[1166]: time="2024-02-09T21:06:55.261938339Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:06:55.262580 env[1166]: time="2024-02-09T21:06:55.262564220Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 21:06:55.262618 env[1166]: time="2024-02-09T21:06:55.262578937Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:06:55.262694 env[1166]: time="2024-02-09T21:06:55.262683310Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 21:06:55.262725 env[1166]: time="2024-02-09T21:06:55.262693670Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 21:06:55.262725 env[1166]: time="2024-02-09T21:06:55.262700926Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 21:06:55.262725 env[1166]: time="2024-02-09T21:06:55.262706849Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 21:06:55.262794 env[1166]: time="2024-02-09T21:06:55.262745038Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:06:55.262872 env[1166]: time="2024-02-09T21:06:55.262863062Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:06:55.262933 env[1166]: time="2024-02-09T21:06:55.262922919Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 21:06:55.262964 env[1166]: time="2024-02-09T21:06:55.262932169Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 21:06:55.262964 env[1166]: time="2024-02-09T21:06:55.262956838Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 21:06:55.263016 env[1166]: time="2024-02-09T21:06:55.262967070Z" level=info msg="metadata content store policy set" policy=shared Feb 9 21:06:55.263562 systemd[1]: Started systemd-logind.service. Feb 9 21:06:55.273043 systemd[1]: Started locksmithd.service. Feb 9 21:06:55.274229 env[1166]: time="2024-02-09T21:06:55.274214819Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 21:06:55.274270 env[1166]: time="2024-02-09T21:06:55.274235472Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 21:06:55.274270 env[1166]: time="2024-02-09T21:06:55.274248638Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 21:06:55.274321 env[1166]: time="2024-02-09T21:06:55.274272324Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 21:06:55.274321 env[1166]: time="2024-02-09T21:06:55.274286243Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 21:06:55.274321 env[1166]: time="2024-02-09T21:06:55.274299251Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 21:06:55.274321 env[1166]: time="2024-02-09T21:06:55.274311779Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 21:06:55.274415 env[1166]: time="2024-02-09T21:06:55.274324777Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 21:06:55.274415 env[1166]: time="2024-02-09T21:06:55.274337548Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 21:06:55.274415 env[1166]: time="2024-02-09T21:06:55.274349958Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 21:06:55.274415 env[1166]: time="2024-02-09T21:06:55.274362211Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 21:06:55.274415 env[1166]: time="2024-02-09T21:06:55.274373919Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 21:06:55.274539 env[1166]: time="2024-02-09T21:06:55.274450077Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 21:06:55.274539 env[1166]: time="2024-02-09T21:06:55.274518890Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 21:06:55.274715 env[1166]: time="2024-02-09T21:06:55.274704048Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 21:06:55.274746 env[1166]: time="2024-02-09T21:06:55.274727458Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.274746 env[1166]: time="2024-02-09T21:06:55.274740757Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 21:06:55.274793 env[1166]: time="2024-02-09T21:06:55.274777718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.274817 env[1166]: time="2024-02-09T21:06:55.274791407Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.274817 env[1166]: time="2024-02-09T21:06:55.274803611Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.274864 env[1166]: time="2024-02-09T21:06:55.274814443Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.274864 env[1166]: time="2024-02-09T21:06:55.274826066Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.274864 env[1166]: time="2024-02-09T21:06:55.274837304Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.274864 env[1166]: time="2024-02-09T21:06:55.274848998Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.274864 env[1166]: time="2024-02-09T21:06:55.274860148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.275007 env[1166]: time="2024-02-09T21:06:55.274873093Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 21:06:55.275007 env[1166]: time="2024-02-09T21:06:55.274964184Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.275007 env[1166]: time="2024-02-09T21:06:55.274978438Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.275007 env[1166]: time="2024-02-09T21:06:55.274989953Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.275007 env[1166]: time="2024-02-09T21:06:55.275001264Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 21:06:55.275127 env[1166]: time="2024-02-09T21:06:55.275013872Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 21:06:55.275127 env[1166]: time="2024-02-09T21:06:55.275024733Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 21:06:55.275127 env[1166]: time="2024-02-09T21:06:55.275039645Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 21:06:55.275127 env[1166]: time="2024-02-09T21:06:55.275068677Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 21:06:55.275286 env[1166]: time="2024-02-09T21:06:55.275243896Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275294628Z" level=info msg="Connect containerd service" Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275321513Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275703866Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275823930Z" level=info msg="Start subscribing containerd event" Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275852749Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275857337Z" level=info msg="Start recovering state" Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275886420Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275890948Z" level=info msg="Start event monitor" Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275898003Z" level=info msg="Start snapshots syncer" Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275903260Z" level=info msg="Start cni network conf syncer for default" Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275907056Z" level=info msg="Start streaming server" Feb 9 21:06:55.277369 env[1166]: time="2024-02-09T21:06:55.275918146Z" level=info msg="containerd successfully booted in 0.023110s" Feb 9 21:06:55.279562 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 21:06:55.279644 systemd[1]: Reached target system-config.target. Feb 9 21:06:55.287529 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 21:06:55.287597 systemd[1]: Reached target user-config.target. Feb 9 21:06:55.297031 systemd[1]: Started containerd.service. Feb 9 21:06:55.332814 locksmithd[1183]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 21:06:55.557498 systemd-networkd[1029]: bond0: Gained IPv6LL Feb 9 21:06:55.557758 systemd-timesyncd[1119]: Network configuration changed, trying to establish connection. Feb 9 21:06:55.569497 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 9 21:06:55.599238 extend-filesystems[1148]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 21:06:55.599238 extend-filesystems[1148]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 21:06:55.599238 extend-filesystems[1148]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 9 21:06:55.636494 extend-filesystems[1134]: Resized filesystem in /dev/sda9 Feb 9 21:06:55.636494 extend-filesystems[1134]: Found sdb Feb 9 21:06:55.599678 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 21:06:55.599771 systemd[1]: Finished extend-filesystems.service. Feb 9 21:06:56.185528 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 21:06:56.197739 systemd-timesyncd[1119]: Network configuration changed, trying to establish connection. Feb 9 21:06:56.197900 systemd-timesyncd[1119]: Network configuration changed, trying to establish connection. Feb 9 21:06:56.198658 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 21:06:56.208722 systemd[1]: Reached target network-online.target. Feb 9 21:06:56.217242 systemd[1]: Starting docker.service... Feb 9 21:06:56.234425 env[1193]: time="2024-02-09T21:06:56.234400340Z" level=info msg="Starting up" Feb 9 21:06:56.235159 env[1193]: time="2024-02-09T21:06:56.235131979Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 21:06:56.235159 env[1193]: time="2024-02-09T21:06:56.235156539Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 21:06:56.235205 env[1193]: time="2024-02-09T21:06:56.235167742Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 21:06:56.235205 env[1193]: time="2024-02-09T21:06:56.235173468Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 21:06:56.236019 env[1193]: time="2024-02-09T21:06:56.236009061Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 21:06:56.236019 env[1193]: time="2024-02-09T21:06:56.236017396Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 21:06:56.236073 env[1193]: time="2024-02-09T21:06:56.236024552Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 21:06:56.236073 env[1193]: time="2024-02-09T21:06:56.236030847Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 21:06:56.249781 env[1193]: time="2024-02-09T21:06:56.249732699Z" level=info msg="Loading containers: start." Feb 9 21:06:56.268454 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:1 Feb 9 21:06:56.364456 kernel: Initializing XFRM netlink socket Feb 9 21:06:56.385326 env[1193]: time="2024-02-09T21:06:56.385306137Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 21:06:56.385979 systemd-timesyncd[1119]: Network configuration changed, trying to establish connection. Feb 9 21:06:56.386040 systemd-timesyncd[1119]: Network configuration changed, trying to establish connection. Feb 9 21:06:56.389029 systemd-timesyncd[1119]: Network configuration changed, trying to establish connection. Feb 9 21:06:56.389141 systemd-timesyncd[1119]: Network configuration changed, trying to establish connection. Feb 9 21:06:56.422213 systemd-networkd[1029]: docker0: Link UP Feb 9 21:06:56.422350 systemd-timesyncd[1119]: Network configuration changed, trying to establish connection. Feb 9 21:06:56.426348 env[1193]: time="2024-02-09T21:06:56.426335628Z" level=info msg="Loading containers: done." Feb 9 21:06:56.431534 env[1193]: time="2024-02-09T21:06:56.431516894Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 21:06:56.431617 env[1193]: time="2024-02-09T21:06:56.431601267Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 21:06:56.431655 env[1193]: time="2024-02-09T21:06:56.431645472Z" level=info msg="Daemon has completed initialization" Feb 9 21:06:56.437628 systemd[1]: Started docker.service. Feb 9 21:06:56.439761 env[1193]: time="2024-02-09T21:06:56.439744003Z" level=info msg="API listen on /run/docker.sock" Feb 9 21:06:56.603724 sshd_keygen[1159]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 21:06:56.614884 systemd[1]: Finished sshd-keygen.service. Feb 9 21:06:56.622533 systemd[1]: Starting issuegen.service... Feb 9 21:06:56.629877 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 21:06:56.629947 systemd[1]: Finished issuegen.service. Feb 9 21:06:56.638204 systemd[1]: Starting systemd-user-sessions.service... Feb 9 21:06:56.647844 systemd[1]: Finished systemd-user-sessions.service. Feb 9 21:06:56.657378 systemd[1]: Started getty@tty1.service. Feb 9 21:06:56.665382 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 21:06:56.673740 systemd[1]: Reached target getty.target. Feb 9 21:06:57.060496 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 9 21:07:01.254792 coreos-metadata[1126]: Feb 09 21:07:01.254 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 21:07:01.255656 coreos-metadata[1127]: Feb 09 21:07:01.254 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 21:07:01.685042 login[1330]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 21:07:01.693157 systemd-logind[1160]: New session 1 of user core. Feb 9 21:07:01.693796 systemd[1]: Created slice user-500.slice. Feb 9 21:07:01.694334 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 21:07:01.694393 login[1329]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 21:07:01.696430 systemd-logind[1160]: New session 2 of user core. Feb 9 21:07:01.699496 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 21:07:01.700165 systemd[1]: Starting user@500.service... Feb 9 21:07:01.701922 (systemd)[1332]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:01.768909 systemd[1332]: Queued start job for default target default.target. Feb 9 21:07:01.769134 systemd[1332]: Reached target paths.target. Feb 9 21:07:01.769145 systemd[1332]: Reached target sockets.target. Feb 9 21:07:01.769153 systemd[1332]: Reached target timers.target. Feb 9 21:07:01.769159 systemd[1332]: Reached target basic.target. Feb 9 21:07:01.769178 systemd[1332]: Reached target default.target. Feb 9 21:07:01.769191 systemd[1332]: Startup finished in 64ms. Feb 9 21:07:01.769237 systemd[1]: Started user@500.service. Feb 9 21:07:01.769769 systemd[1]: Started session-1.scope. Feb 9 21:07:01.770224 systemd[1]: Started session-2.scope. Feb 9 21:07:02.044455 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 9 21:07:02.044707 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 9 21:07:02.169121 systemd[1]: Created slice system-sshd.slice. Feb 9 21:07:02.169748 systemd[1]: Started sshd@0-139.178.88.165:22-43.135.163.185:42074.service. Feb 9 21:07:02.241475 sshd[1353]: Invalid user ptcall from 43.135.163.185 port 42074 Feb 9 21:07:02.247947 sshd[1353]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:02.249063 sshd[1353]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:02.249151 sshd[1353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.163.185 Feb 9 21:07:02.250197 sshd[1353]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:02.254914 coreos-metadata[1126]: Feb 09 21:07:02.254 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 21:07:02.255732 coreos-metadata[1127]: Feb 09 21:07:02.254 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 21:07:02.285692 coreos-metadata[1127]: Feb 09 21:07:02.285 INFO Fetch successful Feb 9 21:07:02.286020 coreos-metadata[1126]: Feb 09 21:07:02.285 INFO Fetch successful Feb 9 21:07:02.311099 systemd[1]: Finished coreos-metadata.service. Feb 9 21:07:02.311854 systemd[1]: Starting etcd-member.service... Feb 9 21:07:02.312342 unknown[1126]: wrote ssh authorized keys file for user: core Feb 9 21:07:02.312548 systemd[1]: Started packet-phone-home.service. Feb 9 21:07:02.318520 curl[1358]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 21:07:02.318520 curl[1358]: Dload Upload Total Spent Left Speed Feb 9 21:07:02.328317 etcd-wrapper[1363]: Error response from daemon: No such container: etcd-member Feb 9 21:07:02.328743 update-ssh-keys[1359]: Updated "/home/core/.ssh/authorized_keys" Feb 9 21:07:02.329009 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 21:07:02.333181 systemd[1]: Started sshd@1-139.178.88.165:22-139.178.89.65:45314.service. Feb 9 21:07:02.340017 etcd-wrapper[1373]: Error: No such container: etcd-member Feb 9 21:07:02.408710 sshd[1375]: Accepted publickey for core from 139.178.89.65 port 45314 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:02.410507 sshd[1375]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:02.412856 etcd-wrapper[1399]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 9 21:07:02.417189 systemd-logind[1160]: New session 3 of user core. Feb 9 21:07:02.418701 systemd[1]: Started session-3.scope. Feb 9 21:07:02.481164 systemd[1]: Started sshd@2-139.178.88.165:22-139.178.89.65:45328.service. Feb 9 21:07:02.494075 curl[1358]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 21:07:02.496387 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 21:07:02.537216 sshd[1416]: Accepted publickey for core from 139.178.89.65 port 45328 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:02.540213 sshd[1416]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:02.549684 systemd-logind[1160]: New session 4 of user core. Feb 9 21:07:02.552163 systemd[1]: Started session-4.scope. Feb 9 21:07:02.629647 sshd[1416]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:02.635738 systemd[1]: sshd@2-139.178.88.165:22-139.178.89.65:45328.service: Deactivated successfully. Feb 9 21:07:02.637319 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 21:07:02.639043 systemd-logind[1160]: Session 4 logged out. Waiting for processes to exit. Feb 9 21:07:02.641563 systemd[1]: Started sshd@3-139.178.88.165:22-139.178.89.65:45336.service. Feb 9 21:07:02.643969 systemd-logind[1160]: Removed session 4. Feb 9 21:07:02.721048 sshd[1422]: Accepted publickey for core from 139.178.89.65 port 45336 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:02.722655 sshd[1422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:02.727848 systemd-logind[1160]: New session 5 of user core. Feb 9 21:07:02.729202 systemd[1]: Started session-5.scope. Feb 9 21:07:02.799089 sshd[1422]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:02.804955 systemd[1]: sshd@3-139.178.88.165:22-139.178.89.65:45336.service: Deactivated successfully. Feb 9 21:07:02.806801 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 21:07:02.808379 systemd-logind[1160]: Session 5 logged out. Waiting for processes to exit. Feb 9 21:07:02.810390 systemd-logind[1160]: Removed session 5. Feb 9 21:07:03.172602 systemd[1]: Started sshd@4-139.178.88.165:22-52.148.221.37:34204.service. Feb 9 21:07:03.872124 etcd-wrapper[1399]: v3.5.0: Pulling from coreos/etcd Feb 9 21:07:04.021334 sshd[1428]: Invalid user benq from 52.148.221.37 port 34204 Feb 9 21:07:04.027409 sshd[1428]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:04.028393 sshd[1428]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:04.028508 sshd[1428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.148.221.37 Feb 9 21:07:04.029541 sshd[1428]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:04.167640 etcd-wrapper[1399]: 1813d21adc01: Pulling fs layer Feb 9 21:07:04.167640 etcd-wrapper[1399]: 6e96907ab677: Pulling fs layer Feb 9 21:07:04.167640 etcd-wrapper[1399]: 444ed0ea8673: Pulling fs layer Feb 9 21:07:04.167640 etcd-wrapper[1399]: 0fd2df5633f0: Pulling fs layer Feb 9 21:07:04.167640 etcd-wrapper[1399]: 8cc22b9456bb: Pulling fs layer Feb 9 21:07:04.167640 etcd-wrapper[1399]: 7ac70aecd290: Pulling fs layer Feb 9 21:07:04.167640 etcd-wrapper[1399]: 4b376c64dfe4: Pulling fs layer Feb 9 21:07:04.167640 etcd-wrapper[1399]: 8cc22b9456bb: Waiting Feb 9 21:07:04.168766 etcd-wrapper[1399]: 4b376c64dfe4: Waiting Feb 9 21:07:04.168766 etcd-wrapper[1399]: 7ac70aecd290: Waiting Feb 9 21:07:04.168766 etcd-wrapper[1399]: 0fd2df5633f0: Waiting Feb 9 21:07:04.188042 sshd[1353]: Failed password for invalid user ptcall from 43.135.163.185 port 42074 ssh2 Feb 9 21:07:04.212646 sshd[1353]: Received disconnect from 43.135.163.185 port 42074:11: Bye Bye [preauth] Feb 9 21:07:04.212646 sshd[1353]: Disconnected from invalid user ptcall 43.135.163.185 port 42074 [preauth] Feb 9 21:07:04.215293 systemd[1]: sshd@0-139.178.88.165:22-43.135.163.185:42074.service: Deactivated successfully. Feb 9 21:07:04.527827 etcd-wrapper[1399]: 444ed0ea8673: Verifying Checksum Feb 9 21:07:04.527827 etcd-wrapper[1399]: 444ed0ea8673: Download complete Feb 9 21:07:04.534076 etcd-wrapper[1399]: 6e96907ab677: Verifying Checksum Feb 9 21:07:04.534076 etcd-wrapper[1399]: 6e96907ab677: Download complete Feb 9 21:07:04.617964 etcd-wrapper[1399]: 1813d21adc01: Verifying Checksum Feb 9 21:07:04.617964 etcd-wrapper[1399]: 1813d21adc01: Download complete Feb 9 21:07:04.849537 etcd-wrapper[1399]: 0fd2df5633f0: Verifying Checksum Feb 9 21:07:04.849537 etcd-wrapper[1399]: 0fd2df5633f0: Download complete Feb 9 21:07:04.860416 etcd-wrapper[1399]: 8cc22b9456bb: Download complete Feb 9 21:07:04.913503 etcd-wrapper[1399]: 7ac70aecd290: Verifying Checksum Feb 9 21:07:04.913503 etcd-wrapper[1399]: 7ac70aecd290: Download complete Feb 9 21:07:05.140165 etcd-wrapper[1399]: 1813d21adc01: Pull complete Feb 9 21:07:05.180011 etcd-wrapper[1399]: 4b376c64dfe4: Verifying Checksum Feb 9 21:07:05.180011 etcd-wrapper[1399]: 4b376c64dfe4: Download complete Feb 9 21:07:05.331027 systemd[1]: var-lib-docker-overlay2-b1a873aa48553842b00dd90395201dc42e759385103ff729d6c03226de34daaa-merged.mount: Deactivated successfully. Feb 9 21:07:05.578304 etcd-wrapper[1399]: 6e96907ab677: Pull complete Feb 9 21:07:05.733288 systemd[1]: var-lib-docker-overlay2-bbbc1f2e92bc970a41b09212a15b429132a7b06f5cb3bc6a7b6e3051ad623523-merged.mount: Deactivated successfully. Feb 9 21:07:05.778913 etcd-wrapper[1399]: 444ed0ea8673: Pull complete Feb 9 21:07:05.907215 sshd[1428]: Failed password for invalid user benq from 52.148.221.37 port 34204 ssh2 Feb 9 21:07:05.959611 etcd-wrapper[1399]: 0fd2df5633f0: Pull complete Feb 9 21:07:06.007254 etcd-wrapper[1399]: 8cc22b9456bb: Pull complete Feb 9 21:07:06.043960 etcd-wrapper[1399]: 7ac70aecd290: Pull complete Feb 9 21:07:06.082158 etcd-wrapper[1399]: 4b376c64dfe4: Pull complete Feb 9 21:07:06.085659 etcd-wrapper[1399]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 9 21:07:06.086700 etcd-wrapper[1399]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 9 21:07:06.145057 systemd[1]: var-lib-docker-overlay2-39672ea793eddd72baf9abd5fbb847e1f1b54928e561d96f351fbda25a37b07d-merged.mount: Deactivated successfully. Feb 9 21:07:06.162973 env[1166]: time="2024-02-09T21:07:06.162779765Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:07:06.162973 env[1166]: time="2024-02-09T21:07:06.162830189Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:07:06.162973 env[1166]: time="2024-02-09T21:07:06.162848770Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:07:06.163493 env[1166]: time="2024-02-09T21:07:06.163010616Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/19313cc19e4ce1fdafc8a4bdcf0c6b0409ae5dc1d5fc16a629d3d2511e1935b8 pid=1601 runtime=io.containerd.runc.v2 Feb 9 21:07:06.196036 systemd[1]: Started docker-19313cc19e4ce1fdafc8a4bdcf0c6b0409ae5dc1d5fc16a629d3d2511e1935b8.scope. Feb 9 21:07:06.274158 etcd-wrapper[1399]: {"level":"info","ts":1707512826.2739174,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 9 21:07:06.274158 etcd-wrapper[1399]: {"level":"info","ts":1707512826.2739625,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"175a830b8d4842af96670c524cbf0f8f"} Feb 9 21:07:06.274158 etcd-wrapper[1399]: {"level":"warn","ts":1707512826.273984,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 9 21:07:06.274158 etcd-wrapper[1399]: {"level":"warn","ts":1707512826.273991,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 9 21:07:06.274158 etcd-wrapper[1399]: {"level":"warn","ts":1707512826.2739956,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 9 21:07:06.274158 etcd-wrapper[1399]: {"level":"warn","ts":1707512826.2739995,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 9 21:07:06.274158 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.274Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.15:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.15:2380","--advertise-client-urls=http://10.67.80.15:2379","--discovery=https://discovery.etcd.io/d7cee3726ea182cdff8b68a2273a83e6","--enable-v2=true"]} Feb 9 21:07:06.274158 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.274Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.15:2380"]} Feb 9 21:07:06.274468 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.274Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 9 21:07:06.274468 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.274Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"175a830b8d4842af96670c524cbf0f8f","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.15:2380"],"listen-peer-urls":["http://10.67.80.15:2380"],"advertise-client-urls":["http://10.67.80.15:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"175a830b8d4842af96670c524cbf0f8f=http://10.67.80.15:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/d7cee3726ea182cdff8b68a2273a83e6","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/d7cee3726ea182cdff8b68a2273a83e6","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 9 21:07:06.275281 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.275Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"687.578µs"} Feb 9 21:07:06.817338 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.816Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"967872570d3885c9"} Feb 9 21:07:06.817338 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.816Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"59ba8d9751c40a95"} Feb 9 21:07:06.817338 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.816Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"1f1e3e590b92487a"} Feb 9 21:07:06.817338 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.816Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3} Feb 9 21:07:06.820624 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.820Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"1f1e3e590b92487a","cluster-id":"a33df597fd260499"} Feb 9 21:07:06.820624 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.820Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=()"} Feb 9 21:07:06.820624 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.820Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became follower at term 0"} Feb 9 21:07:06.820624 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.820Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 1f1e3e590b92487a [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 9 21:07:06.821176 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.820Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became follower at term 1"} Feb 9 21:07:06.821176 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.820Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=(2242298216644233338)"} Feb 9 21:07:06.821176 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.820Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=(2242298216644233338 6465635896095148693)"} Feb 9 21:07:06.821176 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.820Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=(2242298216644233338 6465635896095148693 10842541821103998409)"} Feb 9 21:07:06.822028 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:06.821Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 9 21:07:06.843290 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.842Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 9 21:07:06.844309 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.843Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 9 21:07:06.845113 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.844Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.845113 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.844Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.845795 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.845Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.846148 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.845Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.846663 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.846Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.846663 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.846Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95","remote-peer-urls":["http://10.67.80.13:2380"]} Feb 9 21:07:06.846663 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.846Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:06.846663 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.846Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:06.847398 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.846Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.847917 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.847Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.848501 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.847Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:06.850065 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.849Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:06.850065 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.849Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.850431 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.849Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.850431 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.849Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.852265 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.851Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:06.852265 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.851Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9","remote-peer-urls":["http://10.67.80.17:2380"]} Feb 9 21:07:06.852265 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.852Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"1f1e3e590b92487a","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 9 21:07:06.852265 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.852Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:06.852265 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.852Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:06.853005 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.852Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Feb 9 21:07:06.853199 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.852Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=(2242298216644233338 6465635896095148693 10842541821103998409)"} Feb 9 21:07:06.853329 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.853Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","added-peer-id":"1f1e3e590b92487a","added-peer-peer-urls":["http://10.67.80.15:2380"]} Feb 9 21:07:06.853467 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.853Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=(2242298216644233338 6465635896095148693 10842541821103998409)"} Feb 9 21:07:06.853713 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.853Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","added-peer-id":"59ba8d9751c40a95","added-peer-peer-urls":["http://10.67.80.13:2380"]} Feb 9 21:07:06.853843 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.853Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=(2242298216644233338 6465635896095148693 10842541821103998409)"} Feb 9 21:07:06.853843 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.853Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","added-peer-id":"967872570d3885c9","added-peer-peer-urls":["http://10.67.80.17:2380"]} Feb 9 21:07:06.857702 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:06.857Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Feb 9 21:07:06.857702 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.857Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.15:2380"} Feb 9 21:07:06.857702 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.857Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.15:2380"} Feb 9 21:07:06.858153 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.857Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"1f1e3e590b92487a","initial-advertise-peer-urls":["http://10.67.80.15:2380"],"listen-peer-urls":["http://10.67.80.15:2380"],"advertise-client-urls":["http://10.67.80.15:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 9 21:07:06.858393 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.858Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"1f1e3e590b92487a","to":"59ba8d9751c40a95","stream-type":"stream Message"} Feb 9 21:07:06.858393 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.858Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:06.858393 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.858Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"1f1e3e590b92487a","to":"59ba8d9751c40a95","stream-type":"stream MsgApp v2"} Feb 9 21:07:06.858393 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:06.858Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:07.713314 sshd[1428]: Received disconnect from 52.148.221.37 port 34204:11: Bye Bye [preauth] Feb 9 21:07:07.713314 sshd[1428]: Disconnected from invalid user benq 52.148.221.37 port 34204 [preauth] Feb 9 21:07:07.715850 systemd[1]: sshd@4-139.178.88.165:22-52.148.221.37:34204.service: Deactivated successfully. Feb 9 21:07:08.023672 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:08.023Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 59ba8d9751c40a95 [logterm: 1, index: 3] at term 1"} Feb 9 21:07:08.024945 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:08.024Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [term: 1] received a MsgVote message with higher term from 59ba8d9751c40a95 [term: 2]"} Feb 9 21:07:08.024945 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:08.024Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became follower at term 2"} Feb 9 21:07:08.024945 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:08.024Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 1, index: 3, vote: 0] cast MsgVote for 59ba8d9751c40a95 [logterm: 1, index: 3] at term 2"} Feb 9 21:07:08.041148 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:08.040Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 1f1e3e590b92487a elected leader 59ba8d9751c40a95 at term 2"} Feb 9 21:07:08.045279 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:08.044Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"1f1e3e590b92487a","local-member-attributes":"{Name:175a830b8d4842af96670c524cbf0f8f ClientURLs:[http://10.67.80.15:2379]}","request-path":"/0/members/1f1e3e590b92487a/attributes","cluster-id":"a33df597fd260499","publish-timeout":"7s"} Feb 9 21:07:08.045279 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:08.044Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 9 21:07:08.045755 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:08.045Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 9 21:07:08.045755 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:08.045Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 9 21:07:08.045725 systemd[1]: Started etcd-member.service. Feb 9 21:07:08.047000 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:08.046Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 9 21:07:08.049612 systemd[1]: Starting flanneld.service... Feb 9 21:07:08.361102 etcdctl[1654]: { "Network": "10.254.0.0/16", "Backend": {"Type": "vxlan"} } Feb 9 21:07:08.382260 flannel-wrapper[1665]: Error response from daemon: No such container: flannel Feb 9 21:07:08.394429 flannel-wrapper[1677]: Error: No such container: flannel Feb 9 21:07:08.407873 flannel-wrapper[1698]: Unable to find image 'quay.io/coreos/flannel:v0.14.0' locally Feb 9 21:07:09.603416 flannel-wrapper[1698]: v0.14.0: Pulling from coreos/flannel Feb 9 21:07:09.909495 flannel-wrapper[1698]: 801bfaa63ef2: Pulling fs layer Feb 9 21:07:09.909495 flannel-wrapper[1698]: e4264a7179f6: Pulling fs layer Feb 9 21:07:09.909495 flannel-wrapper[1698]: bc75ea45ad2e: Pulling fs layer Feb 9 21:07:09.909495 flannel-wrapper[1698]: 78648579d12a: Pulling fs layer Feb 9 21:07:09.909495 flannel-wrapper[1698]: 3393447261e4: Pulling fs layer Feb 9 21:07:09.909495 flannel-wrapper[1698]: 071b96dd834b: Pulling fs layer Feb 9 21:07:09.909495 flannel-wrapper[1698]: 4de2f0468a91: Pulling fs layer Feb 9 21:07:09.910303 flannel-wrapper[1698]: 3393447261e4: Waiting Feb 9 21:07:09.910303 flannel-wrapper[1698]: 071b96dd834b: Waiting Feb 9 21:07:09.910303 flannel-wrapper[1698]: 78648579d12a: Waiting Feb 9 21:07:09.910303 flannel-wrapper[1698]: 4de2f0468a91: Waiting Feb 9 21:07:10.047476 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:10.046Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","cluster-version":"3.0"} Feb 9 21:07:10.047476 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:10.047Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.0"} Feb 9 21:07:10.254360 flannel-wrapper[1698]: bc75ea45ad2e: Verifying Checksum Feb 9 21:07:10.254360 flannel-wrapper[1698]: bc75ea45ad2e: Download complete Feb 9 21:07:10.264757 flannel-wrapper[1698]: 801bfaa63ef2: Verifying Checksum Feb 9 21:07:10.264757 flannel-wrapper[1698]: 801bfaa63ef2: Download complete Feb 9 21:07:10.292811 flannel-wrapper[1698]: e4264a7179f6: Verifying Checksum Feb 9 21:07:10.292811 flannel-wrapper[1698]: e4264a7179f6: Download complete Feb 9 21:07:10.344808 flannel-wrapper[1698]: 801bfaa63ef2: Pull complete Feb 9 21:07:10.470184 systemd[1]: var-lib-docker-overlay2-9b3fe8d3c74112eeabf05ebe6113e39f12f3327b4e9e750375f1aa9b3dcd7a99-merged.mount: Deactivated successfully. Feb 9 21:07:10.529591 flannel-wrapper[1698]: e4264a7179f6: Pull complete Feb 9 21:07:10.598274 flannel-wrapper[1698]: 3393447261e4: Verifying Checksum Feb 9 21:07:10.598274 flannel-wrapper[1698]: 3393447261e4: Download complete Feb 9 21:07:10.616193 flannel-wrapper[1698]: 071b96dd834b: Verifying Checksum Feb 9 21:07:10.616193 flannel-wrapper[1698]: 071b96dd834b: Download complete Feb 9 21:07:10.624352 systemd[1]: var-lib-docker-overlay2-546179ab7e0257f535fbf9d4d240285b985aaf3f13be6b9d0caae35f9bd7ac9b-merged.mount: Deactivated successfully. Feb 9 21:07:10.676974 flannel-wrapper[1698]: bc75ea45ad2e: Pull complete Feb 9 21:07:10.896191 flannel-wrapper[1698]: 78648579d12a: Download complete Feb 9 21:07:10.942699 flannel-wrapper[1698]: 4de2f0468a91: Verifying Checksum Feb 9 21:07:11.349930 systemd[1]: var-lib-docker-overlay2-672ea880f67c825e3a7b33546956cf33a0518f592b9e5e2156df0c0d8c22719f-merged.mount: Deactivated successfully. Feb 9 21:07:11.356614 flannel-wrapper[1698]: 78648579d12a: Pull complete Feb 9 21:07:11.384009 systemd[1]: var-lib-docker-overlay2-5b8b22f5145f6070a65e2c6b5d29c6e813a96cbc7191398e00a9ff24162b3b50-merged.mount: Deactivated successfully. Feb 9 21:07:11.387199 flannel-wrapper[1698]: 3393447261e4: Pull complete Feb 9 21:07:11.406704 systemd[1]: var-lib-docker-overlay2-f3f039e8a9883c8bf60f210441fac87eb14d63b104d583d541dd871581d5e39a-merged.mount: Deactivated successfully. Feb 9 21:07:11.409453 flannel-wrapper[1698]: 071b96dd834b: Pull complete Feb 9 21:07:11.444902 flannel-wrapper[1698]: 4de2f0468a91: Pull complete Feb 9 21:07:11.447828 flannel-wrapper[1698]: Digest: sha256:4a330b2f2e74046e493b2edc30d61fdebbdddaaedcb32d62736f25be8d3c64d5 Feb 9 21:07:11.448713 flannel-wrapper[1698]: Status: Downloaded newer image for quay.io/coreos/flannel:v0.14.0 Feb 9 21:07:11.466778 env[1166]: time="2024-02-09T21:07:11.466717923Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:07:11.466778 env[1166]: time="2024-02-09T21:07:11.466739464Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:07:11.466778 env[1166]: time="2024-02-09T21:07:11.466746447Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:07:11.467024 env[1166]: time="2024-02-09T21:07:11.466804861Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/adf75429476c997db46ae52fa1118d174a72befae70daef5e8743267e8b44567 pid=1858 runtime=io.containerd.runc.v2 Feb 9 21:07:11.484786 systemd[1]: Started docker-adf75429476c997db46ae52fa1118d174a72befae70daef5e8743267e8b44567.scope. Feb 9 21:07:11.509325 flannel-wrapper[1698]: I0209 21:07:11.509135 1 main.go:520] Determining IP address of default interface Feb 9 21:07:11.509475 flannel-wrapper[1698]: I0209 21:07:11.509380 1 main.go:533] Using interface with name bond0 and address 139.178.88.165 Feb 9 21:07:11.509475 flannel-wrapper[1698]: I0209 21:07:11.509389 1 main.go:550] Defaulting external address to interface address (139.178.88.165) Feb 9 21:07:11.509475 flannel-wrapper[1698]: I0209 21:07:11.509441 1 main.go:254] Created subnet manager: Etcd Local Manager with Previous Subnet: None Feb 9 21:07:11.509475 flannel-wrapper[1698]: I0209 21:07:11.509449 1 main.go:257] Installing signal handlers Feb 9 21:07:11.511144 flannel-wrapper[1698]: I0209 21:07:11.511006 1 main.go:392] Found network config - Backend type: vxlan Feb 9 21:07:11.511144 flannel-wrapper[1698]: I0209 21:07:11.511038 1 vxlan.go:123] VXLAN config: VNI=1 Port=0 GBP=false Learning=false DirectRouting=false Feb 9 21:07:11.531393 systemd-timesyncd[1119]: Network configuration changed, trying to establish connection. Feb 9 21:07:11.533633 flannel-wrapper[1698]: I0209 21:07:11.533486 1 local_manager.go:234] Picking subnet in range 10.254.1.0 ... 10.254.255.0 Feb 9 21:07:11.534686 flannel-wrapper[1698]: I0209 21:07:11.534569 1 local_manager.go:220] Allocated lease (10.254.12.0/24) to current node (139.178.88.165) Feb 9 21:07:11.535150 systemd-networkd[1029]: flannel.1: Link UP Feb 9 21:07:11.535157 systemd-networkd[1029]: flannel.1: Gained carrier Feb 9 21:07:11.535536 flannel-wrapper[1698]: I0209 21:07:11.535430 1 main.go:357] Current network or subnet (10.254.0.0/16, 10.254.12.0/24) is not equal to previous one (0.0.0.0/0, 0.0.0.0/0), trying to recycle old iptables rules Feb 9 21:07:11.544849 flannel-wrapper[1698]: I0209 21:07:11.544682 1 iptables.go:172] Deleting iptables rule: -s 0.0.0.0/0 -d 0.0.0.0/0 -j RETURN Feb 9 21:07:11.545558 flannel-wrapper[1698]: I0209 21:07:11.545404 1 iptables.go:172] Deleting iptables rule: -s 0.0.0.0/0 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Feb 9 21:07:11.546227 flannel-wrapper[1698]: I0209 21:07:11.546071 1 iptables.go:172] Deleting iptables rule: ! -s 0.0.0.0/0 -d 0.0.0.0/0 -j RETURN Feb 9 21:07:11.546963 flannel-wrapper[1698]: I0209 21:07:11.546798 1 iptables.go:172] Deleting iptables rule: ! -s 0.0.0.0/0 -d 0.0.0.0/0 -j MASQUERADE --random-fully Feb 9 21:07:11.547691 flannel-wrapper[1698]: I0209 21:07:11.547503 1 main.go:307] Setting up masking rules Feb 9 21:07:11.548225 flannel-wrapper[1698]: I0209 21:07:11.548092 1 main.go:315] Changing default FORWARD chain policy to ACCEPT Feb 9 21:07:11.548413 systemd[1]: Started flanneld.service. Feb 9 21:07:11.548789 flannel-wrapper[1698]: I0209 21:07:11.548226 1 main.go:323] Wrote subnet file to /run/flannel/subnet.env Feb 9 21:07:11.548789 flannel-wrapper[1698]: I0209 21:07:11.548238 1 main.go:327] Running backend. Feb 9 21:07:11.548789 flannel-wrapper[1698]: I0209 21:07:11.548279 1 vxlan_network.go:59] watching for new subnet leases Feb 9 21:07:11.548783 systemd[1]: Reached target multi-user.target. Feb 9 21:07:11.549490 flannel-wrapper[1698]: I0209 21:07:11.549397 1 iptables.go:148] Some iptables rules are missing; deleting and recreating rules Feb 9 21:07:11.549490 flannel-wrapper[1698]: I0209 21:07:11.549406 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 -d 10.254.0.0/16 -j RETURN Feb 9 21:07:11.549692 flannel-wrapper[1698]: I0209 21:07:11.549602 1 main.go:439] Waiting for 22h59m59.984070781s to renew lease Feb 9 21:07:11.549692 flannel-wrapper[1698]: I0209 21:07:11.549632 1 iptables.go:148] Some iptables rules are missing; deleting and recreating rules Feb 9 21:07:11.549692 flannel-wrapper[1698]: I0209 21:07:11.549643 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 -j ACCEPT Feb 9 21:07:11.550087 systemd[1]: Starting flannel-docker-opts.service... Feb 9 21:07:11.550407 flannel-wrapper[1698]: I0209 21:07:11.550069 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Feb 9 21:07:11.550469 flannel-wrapper[1698]: I0209 21:07:11.550399 1 iptables.go:172] Deleting iptables rule: -d 10.254.0.0/16 -j ACCEPT Feb 9 21:07:11.550838 flannel-wrapper[1698]: I0209 21:07:11.550768 1 iptables.go:172] Deleting iptables rule: ! -s 10.254.0.0/16 -d 10.254.12.0/24 -j RETURN Feb 9 21:07:11.551125 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 21:07:11.551295 flannel-wrapper[1698]: I0209 21:07:11.551200 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 -j ACCEPT Feb 9 21:07:11.551591 flannel-wrapper[1698]: I0209 21:07:11.551462 1 iptables.go:172] Deleting iptables rule: ! -s 10.254.0.0/16 -d 10.254.0.0/16 -j MASQUERADE --random-fully Feb 9 21:07:11.553032 sh[1943]: + for try in 1 2 3 4 5 6 Feb 9 21:07:11.553227 sh[1943]: + /usr/lib/coreos/flannel-wrapper -d /run/flannel/flannel_docker_opts.env -i Feb 9 21:07:11.555385 flannel-wrapper[1698]: I0209 21:07:11.555253 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 -d 10.254.0.0/16 -j RETURN Feb 9 21:07:11.556058 flannel-wrapper[1698]: I0209 21:07:11.555903 1 iptables.go:160] Adding iptables rule: -d 10.254.0.0/16 -j ACCEPT Feb 9 21:07:11.556921 flannel-wrapper[1698]: I0209 21:07:11.556811 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Feb 9 21:07:11.557188 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 21:07:11.557324 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 21:07:11.558440 flannel-wrapper[1698]: I0209 21:07:11.558339 1 iptables.go:160] Adding iptables rule: ! -s 10.254.0.0/16 -d 10.254.12.0/24 -j RETURN Feb 9 21:07:11.559909 flannel-wrapper[1698]: I0209 21:07:11.559767 1 iptables.go:160] Adding iptables rule: ! -s 10.254.0.0/16 -d 10.254.0.0/16 -j MASQUERADE --random-fully Feb 9 21:07:11.572571 sh[1956]: Error response from daemon: No such container: flannel-docker-opts Feb 9 21:07:11.589083 sh[1974]: Error: No such container: flannel-docker-opts Feb 9 21:07:11.642920 env[1166]: time="2024-02-09T21:07:11.642841497Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:07:11.642920 env[1166]: time="2024-02-09T21:07:11.642867509Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:07:11.642920 env[1166]: time="2024-02-09T21:07:11.642875809Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:07:11.643077 env[1166]: time="2024-02-09T21:07:11.642957962Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/8f7c912aa3b42f5ee74a212ae35e49c08a6a72f89c0404545d3684cb13b9dee4 pid=2006 runtime=io.containerd.runc.v2 Feb 9 21:07:11.661320 systemd[1]: Started docker-8f7c912aa3b42f5ee74a212ae35e49c08a6a72f89c0404545d3684cb13b9dee4.scope. Feb 9 21:07:11.707963 systemd[1]: docker-8f7c912aa3b42f5ee74a212ae35e49c08a6a72f89c0404545d3684cb13b9dee4.scope: Deactivated successfully. Feb 9 21:07:11.745900 env[1166]: time="2024-02-09T21:07:11.745745738Z" level=info msg="shim disconnected" id=8f7c912aa3b42f5ee74a212ae35e49c08a6a72f89c0404545d3684cb13b9dee4 Feb 9 21:07:11.746189 env[1166]: time="2024-02-09T21:07:11.745931395Z" level=warning msg="cleaning up after shim disconnected" id=8f7c912aa3b42f5ee74a212ae35e49c08a6a72f89c0404545d3684cb13b9dee4 namespace=moby Feb 9 21:07:11.746189 env[1166]: time="2024-02-09T21:07:11.745986682Z" level=info msg="cleaning up dead shim" Feb 9 21:07:11.747629 env[1193]: time="2024-02-09T21:07:11.747532303Z" level=info msg="ignoring event" container=8f7c912aa3b42f5ee74a212ae35e49c08a6a72f89c0404545d3684cb13b9dee4 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Feb 9 21:07:11.770172 systemd-timesyncd[1119]: Contacted time server [2604:2dc0:202:300::140d]:123 (2.flatcar.pool.ntp.org). Feb 9 21:07:11.770283 systemd-timesyncd[1119]: Initial clock synchronization to Fri 2024-02-09 21:07:11.997637 UTC. Feb 9 21:07:11.773255 env[1166]: time="2024-02-09T21:07:11.773132730Z" level=warning msg="cleanup warnings time=\"2024-02-09T21:07:11Z\" level=info msg=\"starting signal loop\" namespace=moby pid=2061 runtime=io.containerd.runc.v2\n" Feb 9 21:07:11.780249 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.779Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [term 2] received MsgTimeoutNow from 59ba8d9751c40a95 and starts an election to get leadership."} Feb 9 21:07:11.780249 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.779Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a is starting a new election at term 2"} Feb 9 21:07:11.780249 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.779Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became candidate at term 3"} Feb 9 21:07:11.780249 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.779Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a received MsgVoteResp from 1f1e3e590b92487a at term 3"} Feb 9 21:07:11.780249 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.779Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 2, index: 22] sent MsgVote request to 59ba8d9751c40a95 at term 3"} Feb 9 21:07:11.780249 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.779Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 2, index: 22] sent MsgVote request to 967872570d3885c9 at term 3"} Feb 9 21:07:11.780249 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.779Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 1f1e3e590b92487a lost leader 59ba8d9751c40a95 at term 3"} Feb 9 21:07:11.782178 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.781Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a received MsgVoteResp from 59ba8d9751c40a95 at term 3"} Feb 9 21:07:11.782178 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.781Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a has received 2 MsgVoteResp votes and 0 vote rejections"} Feb 9 21:07:11.782178 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.781Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became leader at term 3"} Feb 9 21:07:11.782178 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.781Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 1f1e3e590b92487a elected leader 1f1e3e590b92487a at term 3"} Feb 9 21:07:11.813888 env[1193]: time="2024-02-09T21:07:11.813796384Z" level=info msg="Processing signal 'terminated'" Feb 9 21:07:11.813896 systemd[1]: Stopping docker.service... Feb 9 21:07:11.841667 flannel-wrapper[1698]: I0209 21:07:11.841199 1 main.go:376] shutdownHandler sent cancel signal... Feb 9 21:07:11.841667 flannel-wrapper[1698]: I0209 21:07:11.841356 1 watch.go:40] context canceled, close receiver chan Feb 9 21:07:11.841667 flannel-wrapper[1698]: I0209 21:07:11.841367 1 watch.go:174] context canceled, close receiver chan Feb 9 21:07:11.841667 flannel-wrapper[1698]: I0209 21:07:11.841401 1 vxlan_network.go:74] evts chan closed Feb 9 21:07:11.841667 flannel-wrapper[1698]: I0209 21:07:11.841421 1 main.go:432] Stopped monitoring lease Feb 9 21:07:11.841667 flannel-wrapper[1698]: I0209 21:07:11.841469 1 main.go:345] Waiting for all goroutines to exit Feb 9 21:07:11.841667 flannel-wrapper[1698]: I0209 21:07:11.841492 1 main.go:348] Exiting cleanly... Feb 9 21:07:11.843171 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.841Z","caller":"osutil/interrupt_unix.go:64","msg":"received signal; shutting down","signal":"terminated"} Feb 9 21:07:11.843171 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.841Z","caller":"embed/etcd.go:367","msg":"closing etcd server","name":"175a830b8d4842af96670c524cbf0f8f","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://10.67.80.15:2380"],"advertise-client-urls":["http://10.67.80.15:2379"]} Feb 9 21:07:11.843171 etcd-wrapper[1399]: WARNING: 2024/02/09 21:07:11 [core] grpc: addrConn.createTransport failed to connect to {0.0.0.0:2379 0.0.0.0:2379 0 }. Err: connection error: desc = "transport: Error while dialing dial tcp 0.0.0.0:2379: connect: connection refused". Reconnecting... Feb 9 21:07:11.843636 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.843Z","caller":"etcdserver/server.go:1398","msg":"leadership transfer starting","local-member-id":"1f1e3e590b92487a","current-leader-member-id":"1f1e3e590b92487a","transferee-member-id":"59ba8d9751c40a95"} Feb 9 21:07:11.843636 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.843Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [term 3] starts to transfer leadership to 59ba8d9751c40a95"} Feb 9 21:07:11.843636 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.843Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a sends MsgTimeoutNow to 59ba8d9751c40a95 immediately as 59ba8d9751c40a95 already has up-to-date log"} Feb 9 21:07:11.845184 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.844Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [term: 3] received a MsgVote message with higher term from 59ba8d9751c40a95 [term: 4]"} Feb 9 21:07:11.845184 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.844Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became follower at term 4"} Feb 9 21:07:11.845184 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.844Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 3, index: 25, vote: 0] cast MsgVote for 59ba8d9751c40a95 [logterm: 3, index: 25] at term 4"} Feb 9 21:07:11.845184 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.844Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 1f1e3e590b92487a lost leader 1f1e3e590b92487a at term 4"} Feb 9 21:07:11.845896 systemd[1]: docker-adf75429476c997db46ae52fa1118d174a72befae70daef5e8743267e8b44567.scope: Deactivated successfully. Feb 9 21:07:11.846425 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.846Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 1f1e3e590b92487a elected leader 59ba8d9751c40a95 at term 4"} Feb 9 21:07:11.852857 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:11.852Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s"} Feb 9 21:07:11.852857 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:11.852Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s"} Feb 9 21:07:11.873614 env[1193]: time="2024-02-09T21:07:11.873526231Z" level=info msg="ignoring event" container=adf75429476c997db46ae52fa1118d174a72befae70daef5e8743267e8b44567 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Feb 9 21:07:11.873849 env[1166]: time="2024-02-09T21:07:11.873521900Z" level=info msg="shim disconnected" id=adf75429476c997db46ae52fa1118d174a72befae70daef5e8743267e8b44567 Feb 9 21:07:11.873849 env[1166]: time="2024-02-09T21:07:11.873628383Z" level=warning msg="cleaning up after shim disconnected" id=adf75429476c997db46ae52fa1118d174a72befae70daef5e8743267e8b44567 namespace=moby Feb 9 21:07:11.873849 env[1166]: time="2024-02-09T21:07:11.873677141Z" level=info msg="cleaning up dead shim" Feb 9 21:07:11.889923 env[1166]: time="2024-02-09T21:07:11.889837603Z" level=warning msg="cleanup warnings time=\"2024-02-09T21:07:11Z\" level=info msg=\"starting signal loop\" namespace=moby pid=2093 runtime=io.containerd.runc.v2\n" Feb 9 21:07:11.943986 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:11.943Z","caller":"etcdserver/server.go:1415","msg":"leadership transfer finished","local-member-id":"1f1e3e590b92487a","old-leader-member-id":"1f1e3e590b92487a","new-leader-member-id":"59ba8d9751c40a95","took":"100.322192ms"} Feb 9 21:07:12.830089 systemd[1]: Started sshd@5-139.178.88.165:22-139.178.89.65:55062.service. Feb 9 21:07:12.868599 sshd[2117]: Accepted publickey for core from 139.178.89.65 port 55062 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:12.869290 sshd[2117]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:12.871768 systemd-logind[1160]: New session 6 of user core. Feb 9 21:07:12.872334 systemd[1]: Started session-6.scope. Feb 9 21:07:12.925216 sshd[2117]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:12.927425 systemd[1]: sshd@5-139.178.88.165:22-139.178.89.65:55062.service: Deactivated successfully. Feb 9 21:07:12.927796 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 21:07:12.928195 systemd-logind[1160]: Session 6 logged out. Waiting for processes to exit. Feb 9 21:07:12.928767 systemd[1]: Started sshd@6-139.178.88.165:22-139.178.89.65:55076.service. Feb 9 21:07:12.929266 systemd-logind[1160]: Removed session 6. Feb 9 21:07:12.967728 sshd[2123]: Accepted publickey for core from 139.178.89.65 port 55076 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:12.968808 sshd[2123]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:12.972470 systemd-logind[1160]: New session 7 of user core. Feb 9 21:07:12.973536 systemd[1]: Started session-7.scope. Feb 9 21:07:13.041362 sshd[2123]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:13.047221 systemd[1]: sshd@6-139.178.88.165:22-139.178.89.65:55076.service: Deactivated successfully. Feb 9 21:07:13.049220 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 21:07:13.051115 systemd-logind[1160]: Session 7 logged out. Waiting for processes to exit. Feb 9 21:07:13.053529 systemd-logind[1160]: Removed session 7. Feb 9 21:07:13.542705 systemd-networkd[1029]: flannel.1: Gained IPv6LL Feb 9 21:07:13.786551 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:13.785Z","caller":"etcdserver/cluster_util.go:288","msg":"failed to reach the peer URL","address":"http://10.67.80.17:2380/version","remote-member-id":"967872570d3885c9","error":"Get \"http://10.67.80.17:2380/version\": dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:13.786551 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:13.786Z","caller":"etcdserver/cluster_util.go:155","msg":"failed to get version","remote-member-id":"967872570d3885c9","error":"Get \"http://10.67.80.17:2380/version\": dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:13.786551 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.786Z","caller":"rafthttp/peer.go:330","msg":"stopping remote peer","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:13.789177 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:13.787Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:13.789177 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.787Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:13.790093 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:13.789Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:13.790093 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.789Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:13.790093 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.789Z","caller":"rafthttp/pipeline.go:85","msg":"stopped HTTP pipelining with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:13.790731 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:13.790Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95","error":"context canceled"} Feb 9 21:07:13.790731 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:13.790Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"59ba8d9751c40a95","error":"failed to read 59ba8d9751c40a95 on stream MsgApp v2 (context canceled)"} Feb 9 21:07:13.790731 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.790Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:13.791323 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:13.790Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95","error":"context canceled"} Feb 9 21:07:13.791323 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.790Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:13.791323 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.790Z","caller":"rafthttp/peer.go:335","msg":"stopped remote peer","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:13.791323 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.790Z","caller":"rafthttp/peer.go:330","msg":"stopping remote peer","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:13.791323 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.790Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"unknown stream","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:13.791323 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.791Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"unknown stream","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:13.791754 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.791Z","caller":"rafthttp/pipeline.go:85","msg":"stopped HTTP pipelining with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:13.791754 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.791Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:13.791754 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.791Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:13.791754 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.791Z","caller":"rafthttp/peer.go:335","msg":"stopped remote peer","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:13.791980 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:13.791Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"1f1e3e590b92487a","remote-peer-id-stream-handler":"1f1e3e590b92487a","remote-peer-id-from":"59ba8d9751c40a95","cluster-id":"a33df597fd260499"} Feb 9 21:07:13.791980 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-09T21:07:13.791Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"1f1e3e590b92487a","remote-peer-id-stream-handler":"1f1e3e590b92487a","remote-peer-id-from":"59ba8d9751c40a95","cluster-id":"a33df597fd260499"} Feb 9 21:07:13.792340 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:13.792Z","caller":"embed/etcd.go:562","msg":"stopping serving peer traffic","address":"10.67.80.15:2380"} Feb 9 21:07:13.994252 systemd[1]: Started sshd@7-139.178.88.165:22-43.153.35.39:58476.service. Feb 9 21:07:14.113476 sshd[2132]: Invalid user ptcall from 43.153.35.39 port 58476 Feb 9 21:07:14.119664 sshd[2132]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:14.120775 sshd[2132]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:14.120868 sshd[2132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.35.39 Feb 9 21:07:14.121833 sshd[2132]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:14.795318 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:14.794Z","caller":"embed/etcd.go:567","msg":"stopped serving peer traffic","address":"10.67.80.15:2380"} Feb 9 21:07:14.795318 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-09T21:07:14.794Z","caller":"embed/etcd.go:369","msg":"closed etcd server","name":"175a830b8d4842af96670c524cbf0f8f","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://10.67.80.15:2380"],"advertise-client-urls":["http://10.67.80.15:2379"]} Feb 9 21:07:14.798365 systemd[1]: docker-19313cc19e4ce1fdafc8a4bdcf0c6b0409ae5dc1d5fc16a629d3d2511e1935b8.scope: Deactivated successfully. Feb 9 21:07:14.816945 env[1166]: time="2024-02-09T21:07:14.816912157Z" level=info msg="shim disconnected" id=19313cc19e4ce1fdafc8a4bdcf0c6b0409ae5dc1d5fc16a629d3d2511e1935b8 Feb 9 21:07:14.816945 env[1166]: time="2024-02-09T21:07:14.816945511Z" level=warning msg="cleaning up after shim disconnected" id=19313cc19e4ce1fdafc8a4bdcf0c6b0409ae5dc1d5fc16a629d3d2511e1935b8 namespace=moby Feb 9 21:07:14.817170 env[1193]: time="2024-02-09T21:07:14.816913361Z" level=info msg="ignoring event" container=19313cc19e4ce1fdafc8a4bdcf0c6b0409ae5dc1d5fc16a629d3d2511e1935b8 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Feb 9 21:07:14.817307 env[1166]: time="2024-02-09T21:07:14.816953493Z" level=info msg="cleaning up dead shim" Feb 9 21:07:14.834640 env[1166]: time="2024-02-09T21:07:14.834612503Z" level=warning msg="cleanup warnings time=\"2024-02-09T21:07:14Z\" level=info msg=\"starting signal loop\" namespace=moby pid=2140 runtime=io.containerd.runc.v2\n" Feb 9 21:07:14.838368 systemd[1]: var-lib-docker-overlay2-913da31e4122645e8d5476e47b3b57afd128cdf75ea6e047429fe3428b1999bd-merged.mount: Deactivated successfully. Feb 9 21:07:14.871419 env[1193]: time="2024-02-09T21:07:14.871320400Z" level=info msg="stopping event stream following graceful shutdown" error="" module=libcontainerd namespace=moby Feb 9 21:07:14.872072 env[1193]: time="2024-02-09T21:07:14.871997509Z" level=info msg="Daemon shutdown complete" Feb 9 21:07:14.872315 env[1193]: time="2024-02-09T21:07:14.872046615Z" level=info msg="stopping event stream following graceful shutdown" error="context canceled" module=libcontainerd namespace=plugins.moby Feb 9 21:07:14.878026 systemd[1]: docker.service: Deactivated successfully. Feb 9 21:07:14.878144 systemd[1]: Stopped docker.service. Feb 9 21:07:14.878181 systemd[1]: docker.service: Consumed 3.769s CPU time. Feb 9 21:07:14.878431 systemd[1]: docker.socket: Deactivated successfully. Feb 9 21:07:14.878582 systemd[1]: Closed docker.socket. Feb 9 21:07:14.878599 systemd[1]: Stopping docker.socket... Feb 9 21:07:14.879220 systemd[1]: Starting docker.socket... Feb 9 21:07:14.879472 systemd[1]: Listening on docker.socket. Feb 9 21:07:14.880254 systemd[1]: Starting docker.service... Feb 9 21:07:14.896849 env[2154]: time="2024-02-09T21:07:14.896793240Z" level=info msg="Starting up" Feb 9 21:07:14.897339 env[2154]: time="2024-02-09T21:07:14.897296323Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 21:07:14.897339 env[2154]: time="2024-02-09T21:07:14.897307922Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 21:07:14.897339 env[2154]: time="2024-02-09T21:07:14.897320309Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 21:07:14.897339 env[2154]: time="2024-02-09T21:07:14.897326532Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 21:07:14.897909 env[2154]: time="2024-02-09T21:07:14.897869417Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 21:07:14.897909 env[2154]: time="2024-02-09T21:07:14.897877201Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 21:07:14.897909 env[2154]: time="2024-02-09T21:07:14.897884485Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 21:07:14.897909 env[2154]: time="2024-02-09T21:07:14.897889226Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 21:07:14.911914 env[2154]: time="2024-02-09T21:07:14.911872131Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Feb 9 21:07:14.918141 env[2154]: time="2024-02-09T21:07:14.918102755Z" level=info msg="Loading containers: start." Feb 9 21:07:15.334232 env[2154]: time="2024-02-09T21:07:15.334156466Z" level=info msg="Loading containers: done." Feb 9 21:07:15.352078 env[2154]: time="2024-02-09T21:07:15.351962278Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 21:07:15.352515 env[2154]: time="2024-02-09T21:07:15.352332191Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 21:07:15.352515 env[2154]: time="2024-02-09T21:07:15.352421631Z" level=info msg="Daemon has completed initialization" Feb 9 21:07:15.357095 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2788679884-merged.mount: Deactivated successfully. Feb 9 21:07:15.372362 systemd[1]: Started docker.service. Feb 9 21:07:15.374023 sh[1949]: Restarted Docker to apply Flannel options Feb 9 21:07:15.374745 sh[1943]: + break Feb 9 21:07:15.374745 sh[1943]: + '[' 1 '!=' fail ']' Feb 9 21:07:15.375727 systemd[1]: Finished flannel-docker-opts.service. Feb 9 21:07:15.376201 systemd[1]: Startup finished in 2.492s (kernel) + 6.691s (initrd) + 26.853s (userspace) = 36.037s. Feb 9 21:07:15.384322 env[2154]: time="2024-02-09T21:07:15.384233784Z" level=info msg="API listen on /run/docker.sock" Feb 9 21:07:15.386068 docker[2105]: flannel Feb 9 21:07:15.386657 docker[2152]: etcd-member Feb 9 21:07:15.430341 docker[2296]: flannel Feb 9 21:07:15.430822 docker[2297]: etcd-member Feb 9 21:07:15.431738 systemd[1]: flanneld.service: Deactivated successfully. Feb 9 21:07:15.432295 systemd[1]: etcd-member.service: Deactivated successfully. Feb 9 21:07:16.042366 sshd[2132]: Failed password for invalid user ptcall from 43.153.35.39 port 58476 ssh2 Feb 9 21:07:16.087559 sshd[2132]: Received disconnect from 43.153.35.39 port 58476:11: Bye Bye [preauth] Feb 9 21:07:16.087559 sshd[2132]: Disconnected from invalid user ptcall 43.153.35.39 port 58476 [preauth] Feb 9 21:07:16.090130 systemd[1]: sshd@7-139.178.88.165:22-43.153.35.39:58476.service: Deactivated successfully. Feb 9 21:07:23.194780 systemd[1]: Started sshd@8-139.178.88.165:22-139.178.89.65:60522.service. Feb 9 21:07:23.233332 sshd[2321]: Accepted publickey for core from 139.178.89.65 port 60522 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:23.234276 sshd[2321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:23.237320 systemd-logind[1160]: New session 8 of user core. Feb 9 21:07:23.237969 systemd[1]: Started session-8.scope. Feb 9 21:07:23.294662 sshd[2321]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:23.296252 systemd[1]: sshd@8-139.178.88.165:22-139.178.89.65:60522.service: Deactivated successfully. Feb 9 21:07:23.296600 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 21:07:23.296936 systemd-logind[1160]: Session 8 logged out. Waiting for processes to exit. Feb 9 21:07:23.297406 systemd[1]: Started sshd@9-139.178.88.165:22-139.178.89.65:60528.service. Feb 9 21:07:23.297878 systemd-logind[1160]: Removed session 8. Feb 9 21:07:23.335880 sshd[2327]: Accepted publickey for core from 139.178.89.65 port 60528 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:23.336831 sshd[2327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:23.340045 systemd-logind[1160]: New session 9 of user core. Feb 9 21:07:23.341026 systemd[1]: Started session-9.scope. Feb 9 21:07:23.395634 sshd[2327]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:23.404030 systemd[1]: sshd@9-139.178.88.165:22-139.178.89.65:60528.service: Deactivated successfully. Feb 9 21:07:23.406122 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 21:07:23.408098 systemd-logind[1160]: Session 9 logged out. Waiting for processes to exit. Feb 9 21:07:23.411084 systemd[1]: Started sshd@10-139.178.88.165:22-139.178.89.65:60544.service. Feb 9 21:07:23.414115 systemd-logind[1160]: Removed session 9. Feb 9 21:07:23.474733 sshd[2333]: Accepted publickey for core from 139.178.89.65 port 60544 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:23.475394 sshd[2333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:23.477656 systemd-logind[1160]: New session 10 of user core. Feb 9 21:07:23.478303 systemd[1]: Started session-10.scope. Feb 9 21:07:23.532900 sshd[2333]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:23.537866 systemd[1]: sshd@10-139.178.88.165:22-139.178.89.65:60544.service: Deactivated successfully. Feb 9 21:07:23.539094 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 21:07:23.540484 systemd-logind[1160]: Session 10 logged out. Waiting for processes to exit. Feb 9 21:07:23.542837 systemd[1]: Started sshd@11-139.178.88.165:22-139.178.89.65:60546.service. Feb 9 21:07:23.545017 systemd-logind[1160]: Removed session 10. Feb 9 21:07:23.584406 sshd[2340]: Accepted publickey for core from 139.178.89.65 port 60546 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:23.585237 sshd[2340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:23.588033 systemd-logind[1160]: New session 11 of user core. Feb 9 21:07:23.588938 systemd[1]: Started session-11.scope. Feb 9 21:07:23.672850 sudo[2343]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 21:07:23.673042 sudo[2343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 21:07:23.690754 dbus-daemon[1130]: \xd0}2\x94yU: received setenforce notice (enforcing=-1302972256) Feb 9 21:07:23.693348 sudo[2343]: pam_unix(sudo:session): session closed for user root Feb 9 21:07:23.696887 sshd[2340]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:23.703998 systemd[1]: sshd@11-139.178.88.165:22-139.178.89.65:60546.service: Deactivated successfully. Feb 9 21:07:23.706222 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 21:07:23.708264 systemd-logind[1160]: Session 11 logged out. Waiting for processes to exit. Feb 9 21:07:23.711325 systemd[1]: Started sshd@12-139.178.88.165:22-139.178.89.65:60554.service. Feb 9 21:07:23.714270 systemd-logind[1160]: Removed session 11. Feb 9 21:07:23.823863 sshd[2347]: Accepted publickey for core from 139.178.89.65 port 60554 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:07:23.825607 sshd[2347]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:07:23.830985 systemd-logind[1160]: New session 12 of user core. Feb 9 21:07:23.832827 systemd[1]: Started session-12.scope. Feb 9 21:07:23.896811 sudo[2351]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 21:07:23.896956 sudo[2351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 21:07:23.898719 sudo[2351]: pam_unix(sudo:session): session closed for user root Feb 9 21:07:23.900987 sudo[2350]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 21:07:23.901094 sudo[2350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 21:07:23.906575 systemd[1]: Stopping audit-rules.service... Feb 9 21:07:23.905000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 21:07:23.907334 auditctl[2354]: No rules Feb 9 21:07:23.907533 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 21:07:23.907625 systemd[1]: Stopped audit-rules.service. Feb 9 21:07:23.908581 systemd[1]: Starting audit-rules.service... Feb 9 21:07:23.912866 kernel: kauditd_printk_skb: 107 callbacks suppressed Feb 9 21:07:23.912911 kernel: audit: type=1305 audit(1707512843.905:130): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 21:07:23.919364 augenrules[2371]: No rules Feb 9 21:07:23.919738 systemd[1]: Finished audit-rules.service. Feb 9 21:07:23.920306 sudo[2350]: pam_unix(sudo:session): session closed for user root Feb 9 21:07:23.921195 sshd[2347]: pam_unix(sshd:session): session closed for user core Feb 9 21:07:23.922694 systemd[1]: sshd@12-139.178.88.165:22-139.178.89.65:60554.service: Deactivated successfully. Feb 9 21:07:23.923182 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 21:07:23.923637 systemd-logind[1160]: Session 12 logged out. Waiting for processes to exit. Feb 9 21:07:23.924140 systemd-logind[1160]: Removed session 12. Feb 9 21:07:23.905000 audit[2354]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe450da810 a2=420 a3=0 items=0 ppid=1 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:23.959773 kernel: audit: type=1300 audit(1707512843.905:130): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe450da810 a2=420 a3=0 items=0 ppid=1 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:23.959802 kernel: audit: type=1327 audit(1707512843.905:130): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 21:07:23.905000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 21:07:23.969368 kernel: audit: type=1131 audit(1707512843.906:131): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:23.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:23.991949 kernel: audit: type=1130 audit(1707512843.918:132): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:23.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:24.014539 kernel: audit: type=1106 audit(1707512843.918:133): pid=2350 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:07:23.918000 audit[2350]: USER_END pid=2350 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:07:24.040733 kernel: audit: type=1104 audit(1707512843.918:134): pid=2350 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:07:23.918000 audit[2350]: CRED_DISP pid=2350 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:07:24.064486 kernel: audit: type=1106 audit(1707512843.920:135): pid=2347 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:07:23.920000 audit[2347]: USER_END pid=2347 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:07:24.096797 kernel: audit: type=1104 audit(1707512843.920:136): pid=2347 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:07:23.920000 audit[2347]: CRED_DISP pid=2347 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:07:24.122826 kernel: audit: type=1131 audit(1707512843.921:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.88.165:22-139.178.89.65:60554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:23.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.88.165:22-139.178.89.65:60554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:25.438916 systemd[1]: flanneld.service: Scheduled restart job, restart counter is at 1. Feb 9 21:07:25.441210 systemd[1]: etcd-member.service: Scheduled restart job, restart counter is at 1. Feb 9 21:07:25.442126 systemd[1]: Stopping flannel-docker-opts.service... Feb 9 21:07:25.452503 docker[2376]: flannel-docker-opts Feb 9 21:07:25.467354 docker[2386]: flannel-docker-opts Feb 9 21:07:25.468201 systemd[1]: flannel-docker-opts.service: Deactivated successfully. Feb 9 21:07:25.468324 systemd[1]: Stopped flannel-docker-opts.service. Feb 9 21:07:25.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flannel-docker-opts comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:25.468569 systemd[1]: Stopped flanneld.service. Feb 9 21:07:25.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:25.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:25.468681 systemd[1]: Stopped etcd-member.service. Feb 9 21:07:25.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:25.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:25.469623 systemd[1]: Starting etcd-member.service... Feb 9 21:07:25.484006 etcd-wrapper[2400]: Error response from daemon: No such container: etcd-member Feb 9 21:07:25.494980 etcd-wrapper[2410]: Error: No such container: etcd-member Feb 9 21:07:25.513219 systemd[1]: var-lib-docker-overlay2-f0f3dd6e4b59d83c2233174de3a2de3063d4c105d221366b95d9fbc9662ec71c\x2dinit-merged.mount: Deactivated successfully. Feb 9 21:07:25.563617 env[1166]: time="2024-02-09T21:07:25.563539011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:07:25.563617 env[1166]: time="2024-02-09T21:07:25.563560020Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:07:25.563617 env[1166]: time="2024-02-09T21:07:25.563566791Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:07:25.563874 env[1166]: time="2024-02-09T21:07:25.563629294Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/dd405c8a4e66f38329f6f7311d54f7d9fb87f7c898cab96ac49bbfbdfba5ed69 pid=2468 runtime=io.containerd.runc.v2 Feb 9 21:07:25.580799 systemd[1]: Started docker-dd405c8a4e66f38329f6f7311d54f7d9fb87f7c898cab96ac49bbfbdfba5ed69.scope. Feb 9 21:07:25.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit: BPF prog-id=39 op=LOAD Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2468 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:25.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64643430356338613465363666333833323966366637333131 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2468 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:25.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64643430356338613465363666333833323966366637333131 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit: BPF prog-id=40 op=LOAD Feb 9 21:07:25.586000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304840 items=0 ppid=2468 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:25.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64643430356338613465363666333833323966366637333131 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.586000 audit: BPF prog-id=41 op=LOAD Feb 9 21:07:25.586000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304888 items=0 ppid=2468 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:25.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64643430356338613465363666333833323966366637333131 Feb 9 21:07:25.586000 audit: BPF prog-id=41 op=UNLOAD Feb 9 21:07:25.586000 audit: BPF prog-id=40 op=UNLOAD Feb 9 21:07:25.587000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.587000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.587000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.587000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.587000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.587000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.587000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.587000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.587000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.587000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:25.587000 audit: BPF prog-id=42 op=LOAD Feb 9 21:07:25.587000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000304ce8 items=0 ppid=2468 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:25.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64643430356338613465363666333833323966366637333131 Feb 9 21:07:25.627686 etcd-wrapper[2432]: {"level":"info","ts":1707512845.627513,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 9 21:07:25.627686 etcd-wrapper[2432]: {"level":"info","ts":1707512845.6275592,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"175a830b8d4842af96670c524cbf0f8f"} Feb 9 21:07:25.627686 etcd-wrapper[2432]: {"level":"warn","ts":1707512845.6275806,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 9 21:07:25.627686 etcd-wrapper[2432]: {"level":"warn","ts":1707512845.627591,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 9 21:07:25.627686 etcd-wrapper[2432]: {"level":"warn","ts":1707512845.6275976,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 9 21:07:25.627686 etcd-wrapper[2432]: {"level":"warn","ts":1707512845.6276033,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 9 21:07:25.628099 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.627Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.15:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.15:2380","--advertise-client-urls=http://10.67.80.15:2379","--discovery=https://discovery.etcd.io/d7cee3726ea182cdff8b68a2273a83e6","--enable-v2=true"]} Feb 9 21:07:25.628099 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.627Z","caller":"etcdmain/etcd.go:115","msg":"server has been already initialized","data-dir":"/var/lib/etcd","dir-type":"member"} Feb 9 21:07:25.628099 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.627Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.15:2380"]} Feb 9 21:07:25.628099 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.627Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 9 21:07:25.628223 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.627Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":true,"name":"175a830b8d4842af96670c524cbf0f8f","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.15:2380"],"listen-peer-urls":["http://10.67.80.15:2380"],"advertise-client-urls":["http://10.67.80.15:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"","initial-cluster-state":"new","initial-cluster-token":"","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/d7cee3726ea182cdff8b68a2273a83e6","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 9 21:07:25.628223 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.628Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"83.3µs"} Feb 9 21:07:25.628335 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:25.628Z","caller":"etcdserver/server.go:480","msg":"discovery token is ignored since cluster already initialized; valid logs are found","wal-dir":"/var/lib/etcd/member/wal"} Feb 9 21:07:25.628373 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.628Z","caller":"etcdserver/server.go:526","msg":"No snapshot found. Recovering WAL from scratch!"} Feb 9 21:07:25.628689 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.628Z","caller":"etcdserver/raft.go:483","msg":"restarting local member","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","commit-index":26} Feb 9 21:07:25.628760 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.628Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=()"} Feb 9 21:07:25.628760 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.628Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became follower at term 4"} Feb 9 21:07:25.628833 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.628Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 1f1e3e590b92487a [peers: [], term: 4, commit: 26, applied: 0, lastindex: 26, lastterm: 4]"} Feb 9 21:07:25.629067 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.629Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.0"} Feb 9 21:07:25.629117 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.629Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","recovered-remote-peer-id":"1f1e3e590b92487a","recovered-remote-peer-urls":["http://10.67.80.15:2380"]} Feb 9 21:07:25.629117 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.629Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","recovered-remote-peer-id":"59ba8d9751c40a95","recovered-remote-peer-urls":["http://10.67.80.13:2380"]} Feb 9 21:07:25.629117 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.629Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","recovered-remote-peer-id":"967872570d3885c9","recovered-remote-peer-urls":["http://10.67.80.17:2380"]} Feb 9 21:07:25.629117 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.629Z","caller":"membership/cluster.go:285","msg":"set cluster version from store","cluster-version":"3.0"} Feb 9 21:07:25.629372 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:25.629Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 9 21:07:25.629784 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.629Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 9 21:07:25.629899 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.629Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 9 21:07:25.630095 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.629Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:25.630095 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.630Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:25.630414 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.630Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:25.630676 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.630Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:25.631190 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:25.631190 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:25.631190 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95","remote-peer-urls":["http://10.67.80.13:2380"]} Feb 9 21:07:25.631190 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:25.631190 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:25.631354 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:25.631669 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:25.631669 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:25.631895 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:25.631895 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9","remote-peer-urls":["http://10.67.80.17:2380"]} Feb 9 21:07:25.632013 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.631Z","caller":"etcdserver/server.go:834","msg":"starting etcd server","local-member-id":"1f1e3e590b92487a","local-server-version":"3.5.0","cluster-id":"a33df597fd260499","cluster-version":"3.0"} Feb 9 21:07:25.632103 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.632Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:25.632178 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.632Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Feb 9 21:07:25.632178 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.632Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"967872570d3885c9"} Feb 9 21:07:25.632310 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.632Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=(2242298216644233338)"} Feb 9 21:07:25.632349 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.632Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","added-peer-id":"1f1e3e590b92487a","added-peer-peer-urls":["http://10.67.80.15:2380"]} Feb 9 21:07:25.632393 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.632Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=(2242298216644233338 6465635896095148693)"} Feb 9 21:07:25.632430 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.632Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","added-peer-id":"59ba8d9751c40a95","added-peer-peer-urls":["http://10.67.80.13:2380"]} Feb 9 21:07:25.632468 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.632Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a switched to configuration voters=(2242298216644233338 6465635896095148693 10842541821103998409)"} Feb 9 21:07:25.632468 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.632Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","added-peer-id":"967872570d3885c9","added-peer-peer-urls":["http://10.67.80.17:2380"]} Feb 9 21:07:25.632543 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.632Z","caller":"membership/cluster.go:523","msg":"updated cluster version","cluster-id":"a33df597fd260499","local-member-id":"1f1e3e590b92487a","from":"3.0","to":"3.0"} Feb 9 21:07:25.633356 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:25.633Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Feb 9 21:07:25.633414 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.633Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.15:2380"} Feb 9 21:07:25.633414 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.633Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.15:2380"} Feb 9 21:07:25.633490 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:25.633Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"1f1e3e590b92487a","initial-advertise-peer-urls":["http://10.67.80.15:2380"],"listen-peer-urls":["http://10.67.80.15:2380"],"advertise-client-urls":["http://10.67.80.15:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 9 21:07:27.429712 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:27.429Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a is starting a new election at term 4"} Feb 9 21:07:27.429712 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:27.429Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became pre-candidate at term 4"} Feb 9 21:07:27.429712 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:27.429Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a received MsgPreVoteResp from 1f1e3e590b92487a at term 4"} Feb 9 21:07:27.429712 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:27.429Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 4, index: 26] sent MsgPreVote request to 59ba8d9751c40a95 at term 4"} Feb 9 21:07:27.429712 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:27.429Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 4, index: 26] sent MsgPreVote request to 967872570d3885c9 at term 4"} Feb 9 21:07:29.229805 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:29.229Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a is starting a new election at term 4"} Feb 9 21:07:29.229805 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:29.229Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became pre-candidate at term 4"} Feb 9 21:07:29.229805 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:29.229Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a received MsgPreVoteResp from 1f1e3e590b92487a at term 4"} Feb 9 21:07:29.229805 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:29.229Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 4, index: 26] sent MsgPreVote request to 59ba8d9751c40a95 at term 4"} Feb 9 21:07:29.229805 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:29.229Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 4, index: 26] sent MsgPreVote request to 967872570d3885c9 at term 4"} Feb 9 21:07:29.554999 systemd[1]: Started sshd@13-139.178.88.165:22-218.92.0.31:44791.service. Feb 9 21:07:29.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.88.165:22-218.92.0.31:44791 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:29.560683 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 21:07:29.560759 kernel: audit: type=1130 audit(1707512849.554:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.88.165:22-218.92.0.31:44791 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:30.334707 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:30.334Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"1f1e3e590b92487a","to":"59ba8d9751c40a95","stream-type":"stream MsgApp v2"} Feb 9 21:07:30.334707 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:30.334Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"59ba8d9751c40a95"} Feb 9 21:07:30.334707 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:30.334Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:30.334707 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:30.334Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"1f1e3e590b92487a","to":"59ba8d9751c40a95","stream-type":"stream Message"} Feb 9 21:07:30.334707 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:30.334Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:30.336226 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:30.335Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:30.336226 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:30.335Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"1f1e3e590b92487a","remote-peer-id":"59ba8d9751c40a95"} Feb 9 21:07:30.523559 sshd[2520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:07:30.522000 audit[2520]: USER_AUTH pid=2520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:30.600638 kernel: audit: type=1100 audit(1707512850.522:162): pid=2520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:30.631813 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:30.631Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: connect: connection refused"} Feb 9 21:07:30.631813 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:30.631Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"59ba8d9751c40a95","rtt":"0s","error":"dial tcp 10.67.80.13:2380: connect: connection refused"} Feb 9 21:07:30.632869 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:30.632Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s"} Feb 9 21:07:30.632869 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:30.632Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s"} Feb 9 21:07:31.030849 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:31.030Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a is starting a new election at term 4"} Feb 9 21:07:31.030849 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:31.030Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became pre-candidate at term 4"} Feb 9 21:07:31.030849 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:31.030Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a received MsgPreVoteResp from 1f1e3e590b92487a at term 4"} Feb 9 21:07:31.030849 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:31.030Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 4, index: 26] sent MsgPreVote request to 59ba8d9751c40a95 at term 4"} Feb 9 21:07:31.030849 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:31.030Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 4, index: 26] sent MsgPreVote request to 967872570d3885c9 at term 4"} Feb 9 21:07:31.032182 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:31.031Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a received MsgPreVoteResp rejection from 59ba8d9751c40a95 at term 4"} Feb 9 21:07:31.032182 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:31.031Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a has received 1 MsgPreVoteResp votes and 1 vote rejections"} Feb 9 21:07:32.037310 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:32.036Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 4, index: 26, vote: 59ba8d9751c40a95] cast MsgPreVote for 59ba8d9751c40a95 [logterm: 4, index: 30] at term 4"} Feb 9 21:07:32.039336 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:32.038Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [term: 4] received a MsgVote message with higher term from 59ba8d9751c40a95 [term: 5]"} Feb 9 21:07:32.039336 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:32.038Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a became follower at term 5"} Feb 9 21:07:32.039336 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:32.038Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"1f1e3e590b92487a [logterm: 4, index: 26, vote: 0] cast MsgVote for 59ba8d9751c40a95 [logterm: 4, index: 30] at term 5"} Feb 9 21:07:32.056731 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:32.056Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 1f1e3e590b92487a elected leader 59ba8d9751c40a95 at term 5"} Feb 9 21:07:32.060563 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:32.060Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"1f1e3e590b92487a","local-member-attributes":"{Name:175a830b8d4842af96670c524cbf0f8f ClientURLs:[http://10.67.80.15:2379]}","request-path":"/0/members/1f1e3e590b92487a/attributes","cluster-id":"a33df597fd260499","publish-timeout":"7s"} Feb 9 21:07:32.060563 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:32.060Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 9 21:07:32.061160 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:32.060Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 9 21:07:32.061408 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:32.060Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 9 21:07:32.061334 systemd[1]: Started etcd-member.service. Feb 9 21:07:32.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:32.062600 etcd-wrapper[2432]: {"level":"info","ts":"2024-02-09T21:07:32.061Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 9 21:07:32.065981 systemd[1]: Starting flanneld.service... Feb 9 21:07:32.074872 etcdctl[2524]: { "Network": "10.254.0.0/16", "Backend": {"Type": "vxlan"} } Feb 9 21:07:32.088893 flannel-wrapper[2534]: Error response from daemon: No such container: flannel Feb 9 21:07:32.100089 flannel-wrapper[2544]: Error: No such container: flannel Feb 9 21:07:32.115755 systemd[1]: var-lib-docker-overlay2-11ebe4f6b75b30e51fd79d2b211cd68b35bc95610c7f2b11e4f3a7247efe7657\x2dinit-merged.mount: Deactivated successfully. Feb 9 21:07:32.120510 kernel: audit: type=1130 audit(1707512852.061:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:32.160056 env[1166]: time="2024-02-09T21:07:32.159988932Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:07:32.160056 env[1166]: time="2024-02-09T21:07:32.160010678Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:07:32.160056 env[1166]: time="2024-02-09T21:07:32.160017952Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:07:32.160286 env[1166]: time="2024-02-09T21:07:32.160150172Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/50be9da7f6bf11159f7097117c5007e6e49b2b18f0e483e18fbe945beaa5839c pid=2580 runtime=io.containerd.runc.v2 Feb 9 21:07:32.177921 systemd[1]: Started docker-50be9da7f6bf11159f7097117c5007e6e49b2b18f0e483e18fbe945beaa5839c.scope. Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2580 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:32.331376 kernel: audit: type=1400 audit(1707512852.184:164): avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.331419 kernel: audit: type=1300 audit(1707512852.184:164): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2580 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:32.331436 kernel: audit: type=1327 audit(1707512852.184:164): proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F35306265396461376636626631313135396637303937313137 Feb 9 21:07:32.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F35306265396461376636626631313135396637303937313137 Feb 9 21:07:32.420527 kernel: audit: type=1400 audit(1707512852.184:165): avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482789 kernel: audit: type=1400 audit(1707512852.184:165): avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.545693 kernel: audit: type=1400 audit(1707512852.184:165): avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.609299 kernel: audit: type=1400 audit(1707512852.184:165): avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.636504 sshd[2520]: Failed password for root from 218.92.0.31 port 44791 ssh2 Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.184000 audit: BPF prog-id=43 op=LOAD Feb 9 21:07:32.184000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003046d0 items=0 ppid=2580 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:32.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F35306265396461376636626631313135396637303937313137 Feb 9 21:07:32.329000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.329000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.329000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.329000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.329000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.329000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.329000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.329000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.329000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.329000 audit: BPF prog-id=44 op=LOAD Feb 9 21:07:32.329000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000304718 items=0 ppid=2580 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:32.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F35306265396461376636626631313135396637303937313137 Feb 9 21:07:32.482000 audit: BPF prog-id=44 op=UNLOAD Feb 9 21:07:32.482000 audit: BPF prog-id=43 op=UNLOAD Feb 9 21:07:32.482000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.482000 audit: BPF prog-id=45 op=LOAD Feb 9 21:07:32.482000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003047a8 items=0 ppid=2580 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:32.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F35306265396461376636626631313135396637303937313137 Feb 9 21:07:32.704641 flannel-wrapper[2564]: I0209 21:07:32.704478 1 main.go:520] Determining IP address of default interface Feb 9 21:07:32.704833 flannel-wrapper[2564]: I0209 21:07:32.704682 1 main.go:533] Using interface with name bond0 and address 139.178.88.165 Feb 9 21:07:32.704833 flannel-wrapper[2564]: I0209 21:07:32.704689 1 main.go:550] Defaulting external address to interface address (139.178.88.165) Feb 9 21:07:32.704879 flannel-wrapper[2564]: I0209 21:07:32.704776 1 main.go:254] Created subnet manager: Etcd Local Manager with Previous Subnet: 10.254.12.0/24 Feb 9 21:07:32.704879 flannel-wrapper[2564]: I0209 21:07:32.704779 1 main.go:257] Installing signal handlers Feb 9 21:07:32.706620 flannel-wrapper[2564]: I0209 21:07:32.706443 1 main.go:392] Found network config - Backend type: vxlan Feb 9 21:07:32.706620 flannel-wrapper[2564]: I0209 21:07:32.706467 1 vxlan.go:123] VXLAN config: VNI=1 Port=0 GBP=false Learning=false DirectRouting=false Feb 9 21:07:32.708418 flannel-wrapper[2564]: I0209 21:07:32.708332 1 local_manager.go:147] Found lease (10.254.12.0/24) for current IP (139.178.88.165), reusing Feb 9 21:07:32.709411 flannel-wrapper[2564]: I0209 21:07:32.709271 1 main.go:307] Setting up masking rules Feb 9 21:07:32.714913 flannel-wrapper[2564]: I0209 21:07:32.714796 1 main.go:315] Changing default FORWARD chain policy to ACCEPT Feb 9 21:07:32.714913 flannel-wrapper[2564]: I0209 21:07:32.714857 1 main.go:323] Wrote subnet file to /run/flannel/subnet.env Feb 9 21:07:32.714913 flannel-wrapper[2564]: I0209 21:07:32.714864 1 main.go:327] Running backend. Feb 9 21:07:32.714992 systemd[1]: Started flanneld.service. Feb 9 21:07:32.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flanneld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:32.715189 flannel-wrapper[2564]: I0209 21:07:32.715067 1 vxlan_network.go:59] watching for new subnet leases Feb 9 21:07:32.716128 systemd[1]: Starting flannel-docker-opts.service... Feb 9 21:07:32.717246 flannel-wrapper[2564]: I0209 21:07:32.717165 1 main.go:439] Waiting for 22h59m59.991304921s to renew lease Feb 9 21:07:32.718245 sh[2654]: + for try in 1 2 3 4 5 6 Feb 9 21:07:32.718245 sh[2654]: + /usr/lib/coreos/flannel-wrapper -d /run/flannel/flannel_docker_opts.env -i Feb 9 21:07:32.731331 sh[2661]: Error response from daemon: No such container: flannel-docker-opts Feb 9 21:07:32.743006 sh[2672]: Error: No such container: flannel-docker-opts Feb 9 21:07:32.773458 env[1166]: time="2024-02-09T21:07:32.773423011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:07:32.773458 env[1166]: time="2024-02-09T21:07:32.773442883Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:07:32.773458 env[1166]: time="2024-02-09T21:07:32.773452705Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:07:32.773635 env[1166]: time="2024-02-09T21:07:32.773517247Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/ca9285074beaef283329cc0c80a4167b70e75e1cf01270e729abe8faa0e302a9 pid=2706 runtime=io.containerd.runc.v2 Feb 9 21:07:32.791962 systemd[1]: Started docker-ca9285074beaef283329cc0c80a4167b70e75e1cf01270e729abe8faa0e302a9.scope. Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: SYSCALL arch=c000003e syscall=321 success=yes exit=14 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2706 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:32.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63613932383530373462656165663238333332396363306338 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit: BPF prog-id=46 op=LOAD Feb 9 21:07:32.798000 audit[2717]: SYSCALL arch=c000003e syscall=321 success=yes exit=14 a0=5 a1=c0001459d8 a2=78 a3=c00021cfa0 items=0 ppid=2706 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:32.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63613932383530373462656165663238333332396363306338 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit: BPF prog-id=47 op=LOAD Feb 9 21:07:32.798000 audit[2717]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145770 a2=78 a3=c00021cfe8 items=0 ppid=2706 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:32.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63613932383530373462656165663238333332396363306338 Feb 9 21:07:32.798000 audit: BPF prog-id=47 op=UNLOAD Feb 9 21:07:32.798000 audit: BPF prog-id=46 op=UNLOAD Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:07:32.798000 audit: BPF prog-id=48 op=LOAD Feb 9 21:07:32.798000 audit[2717]: SYSCALL arch=c000003e syscall=321 success=yes exit=14 a0=5 a1=c000145c30 a2=78 a3=c00021d078 items=0 ppid=2706 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:07:32.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63613932383530373462656165663238333332396363306338 Feb 9 21:07:32.822565 systemd[1]: docker-ca9285074beaef283329cc0c80a4167b70e75e1cf01270e729abe8faa0e302a9.scope: Deactivated successfully. Feb 9 21:07:32.836000 audit: BPF prog-id=48 op=UNLOAD Feb 9 21:07:32.851219 env[1166]: time="2024-02-09T21:07:32.851094732Z" level=info msg="shim disconnected" id=ca9285074beaef283329cc0c80a4167b70e75e1cf01270e729abe8faa0e302a9 Feb 9 21:07:32.851499 env[1166]: time="2024-02-09T21:07:32.851219964Z" level=warning msg="cleaning up after shim disconnected" id=ca9285074beaef283329cc0c80a4167b70e75e1cf01270e729abe8faa0e302a9 namespace=moby Feb 9 21:07:32.851499 env[1166]: time="2024-02-09T21:07:32.851251135Z" level=info msg="cleaning up dead shim" Feb 9 21:07:32.851751 env[2154]: time="2024-02-09T21:07:32.851153585Z" level=info msg="ignoring event" container=ca9285074beaef283329cc0c80a4167b70e75e1cf01270e729abe8faa0e302a9 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Feb 9 21:07:32.858618 env[1166]: time="2024-02-09T21:07:32.858567588Z" level=warning msg="cleanup warnings time=\"2024-02-09T21:07:32Z\" level=info msg=\"starting signal loop\" namespace=moby pid=2761 runtime=io.containerd.runc.v2\n" Feb 9 21:07:32.870468 sh[2654]: + break Feb 9 21:07:32.870468 sh[2654]: + '[' 1 '!=' fail ']' Feb 9 21:07:32.870835 systemd[1]: Finished flannel-docker-opts.service. Feb 9 21:07:32.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flannel-docker-opts comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:34.049000 audit[2520]: USER_AUTH pid=2520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:35.634309 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:35.633Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:35.634309 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:35.633Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:36.048357 sshd[2520]: Failed password for root from 218.92.0.31 port 44791 ssh2 Feb 9 21:07:37.939000 audit[2520]: USER_AUTH pid=2520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:37.968336 kernel: kauditd_printk_skb: 83 callbacks suppressed Feb 9 21:07:37.968377 kernel: audit: type=1100 audit(1707512857.939:180): pid=2520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:39.683144 sshd[2520]: Failed password for root from 218.92.0.31 port 44791 ssh2 Feb 9 21:07:40.346898 update_engine[1162]: I0209 21:07:40.346778 1162 update_attempter.cc:509] Updating boot flags... Feb 9 21:07:40.635190 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:40.634Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:40.635190 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:40.634Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:41.466709 sshd[2520]: Received disconnect from 218.92.0.31 port 44791:11: [preauth] Feb 9 21:07:41.466709 sshd[2520]: Disconnected from authenticating user root 218.92.0.31 port 44791 [preauth] Feb 9 21:07:41.467252 sshd[2520]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:07:41.469275 systemd[1]: sshd@13-139.178.88.165:22-218.92.0.31:44791.service: Deactivated successfully. Feb 9 21:07:41.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.88.165:22-218.92.0.31:44791 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:41.560639 kernel: audit: type=1131 audit(1707512861.468:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.88.165:22-218.92.0.31:44791 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:41.610746 systemd[1]: Started sshd@14-139.178.88.165:22-218.92.0.31:52770.service. Feb 9 21:07:41.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.88.165:22-218.92.0.31:52770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:41.702641 kernel: audit: type=1130 audit(1707512861.609:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.88.165:22-218.92.0.31:52770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:43.132200 sshd[2800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:07:43.131000 audit[2800]: USER_AUTH pid=2800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:43.223612 kernel: audit: type=1100 audit(1707512863.131:183): pid=2800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:44.699047 sshd[2800]: Failed password for root from 218.92.0.31 port 52770 ssh2 Feb 9 21:07:44.964000 audit[2800]: ANOM_LOGIN_FAILURES pid=2800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:44.965397 sshd[2800]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:07:44.965000 audit[2800]: USER_AUTH pid=2800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:45.118474 kernel: audit: type=2100 audit(1707512864.964:184): pid=2800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:45.118505 kernel: audit: type=1100 audit(1707512864.965:185): pid=2800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:45.403702 systemd[1]: Started sshd@15-139.178.88.165:22-43.153.48.160:60424.service. Feb 9 21:07:45.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.88.165:22-43.153.48.160:60424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:45.495645 kernel: audit: type=1130 audit(1707512865.402:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.88.165:22-43.153.48.160:60424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:45.545984 sshd[2809]: Invalid user xo from 43.153.48.160 port 60424 Feb 9 21:07:45.547343 sshd[2809]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:45.547565 sshd[2809]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:45.547586 sshd[2809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.48.160 Feb 9 21:07:45.547810 sshd[2809]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:45.546000 audit[2809]: USER_AUTH pid=2809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xo" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:07:45.635230 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:45.635Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:45.635230 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:45.635Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:45.637452 kernel: audit: type=1100 audit(1707512865.546:187): pid=2809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xo" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:07:46.667790 sshd[2800]: Failed password for root from 218.92.0.31 port 52770 ssh2 Feb 9 21:07:47.720708 sshd[2809]: Failed password for invalid user xo from 43.153.48.160 port 60424 ssh2 Feb 9 21:07:48.487000 audit[2800]: USER_AUTH pid=2800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:48.580630 kernel: audit: type=1100 audit(1707512868.487:188): pid=2800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:48.758784 sshd[2809]: Received disconnect from 43.153.48.160 port 60424:11: Bye Bye [preauth] Feb 9 21:07:48.758784 sshd[2809]: Disconnected from invalid user xo 43.153.48.160 port 60424 [preauth] Feb 9 21:07:48.761166 systemd[1]: sshd@15-139.178.88.165:22-43.153.48.160:60424.service: Deactivated successfully. Feb 9 21:07:48.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.88.165:22-43.153.48.160:60424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:48.854537 kernel: audit: type=1131 audit(1707512868.761:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.88.165:22-43.153.48.160:60424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:49.072330 systemd[1]: Started sshd@16-139.178.88.165:22-152.136.41.37:50538.service. Feb 9 21:07:49.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.88.165:22-152.136.41.37:50538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:49.165454 kernel: audit: type=1130 audit(1707512869.072:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.88.165:22-152.136.41.37:50538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:49.177911 systemd[1]: Started sshd@17-139.178.88.165:22-35.219.62.194:46028.service. Feb 9 21:07:49.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.88.165:22-35.219.62.194:46028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:49.269637 kernel: audit: type=1130 audit(1707512869.177:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.88.165:22-35.219.62.194:46028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:50.263472 sshd[2822]: Invalid user behnamabolghasemi from 35.219.62.194 port 46028 Feb 9 21:07:50.269727 sshd[2822]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:50.270780 sshd[2822]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:07:50.270870 sshd[2822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.219.62.194 Feb 9 21:07:50.271898 sshd[2822]: pam_faillock(sshd:auth): User unknown Feb 9 21:07:50.270000 audit[2822]: USER_AUTH pid=2822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="behnamabolghasemi" exe="/usr/sbin/sshd" hostname=35.219.62.194 addr=35.219.62.194 terminal=ssh res=failed' Feb 9 21:07:50.364480 kernel: audit: type=1100 audit(1707512870.270:192): pid=2822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="behnamabolghasemi" exe="/usr/sbin/sshd" hostname=35.219.62.194 addr=35.219.62.194 terminal=ssh res=failed' Feb 9 21:07:50.406716 sshd[2800]: Failed password for root from 218.92.0.31 port 52770 ssh2 Feb 9 21:07:50.635826 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:50.635Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:50.635826 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:50.635Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:51.798585 sshd[2822]: Failed password for invalid user behnamabolghasemi from 35.219.62.194 port 46028 ssh2 Feb 9 21:07:52.012317 sshd[2800]: Received disconnect from 218.92.0.31 port 52770:11: [preauth] Feb 9 21:07:52.012317 sshd[2800]: Disconnected from authenticating user root 218.92.0.31 port 52770 [preauth] Feb 9 21:07:52.012845 sshd[2800]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:07:52.014813 systemd[1]: sshd@14-139.178.88.165:22-218.92.0.31:52770.service: Deactivated successfully. Feb 9 21:07:52.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.88.165:22-218.92.0.31:52770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:52.108645 kernel: audit: type=1131 audit(1707512872.014:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.88.165:22-218.92.0.31:52770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:52.418216 sshd[2822]: Received disconnect from 35.219.62.194 port 46028:11: Bye Bye [preauth] Feb 9 21:07:52.418216 sshd[2822]: Disconnected from invalid user behnamabolghasemi 35.219.62.194 port 46028 [preauth] Feb 9 21:07:52.420896 systemd[1]: sshd@17-139.178.88.165:22-35.219.62.194:46028.service: Deactivated successfully. Feb 9 21:07:52.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.88.165:22-35.219.62.194:46028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:52.514637 kernel: audit: type=1131 audit(1707512872.421:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.88.165:22-35.219.62.194:46028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:52.602520 systemd[1]: Started sshd@18-139.178.88.165:22-218.92.0.31:51591.service. Feb 9 21:07:52.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.88.165:22-218.92.0.31:51591 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:52.696643 kernel: audit: type=1130 audit(1707512872.602:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.88.165:22-218.92.0.31:51591 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:07:53.973234 sshd[2828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:07:53.972000 audit[2828]: USER_AUTH pid=2828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:54.065481 kernel: audit: type=1100 audit(1707512873.972:196): pid=2828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:55.636378 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:55.635Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:55.636378 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:07:55.635Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:07:55.911757 sshd[2828]: Failed password for root from 218.92.0.31 port 51591 ssh2 Feb 9 21:07:57.504000 audit[2828]: USER_AUTH pid=2828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:57.598631 kernel: audit: type=1100 audit(1707512877.504:197): pid=2828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:07:59.659634 sshd[2828]: Failed password for root from 218.92.0.31 port 51591 ssh2 Feb 9 21:08:00.637121 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:00.636Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:00.637121 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:00.636Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:01.033000 audit[2828]: USER_AUTH pid=2828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:08:01.127629 kernel: audit: type=1100 audit(1707512881.033:198): pid=2828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 9 21:08:02.737492 sshd[2828]: Failed password for root from 218.92.0.31 port 51591 ssh2 Feb 9 21:08:04.151293 systemd[1]: Started sshd@19-139.178.88.165:22-52.148.221.37:34420.service. Feb 9 21:08:04.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.88.165:22-52.148.221.37:34420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:04.244467 kernel: audit: type=1130 audit(1707512884.151:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.88.165:22-52.148.221.37:34420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:04.564385 sshd[2828]: Received disconnect from 218.92.0.31 port 51591:11: [preauth] Feb 9 21:08:04.564385 sshd[2828]: Disconnected from authenticating user root 218.92.0.31 port 51591 [preauth] Feb 9 21:08:04.564909 sshd[2828]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 9 21:08:04.566918 systemd[1]: sshd@18-139.178.88.165:22-218.92.0.31:51591.service: Deactivated successfully. Feb 9 21:08:04.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.88.165:22-218.92.0.31:51591 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:04.660640 kernel: audit: type=1131 audit(1707512884.567:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.88.165:22-218.92.0.31:51591 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:05.637768 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:05.637Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:05.637768 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:05.637Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:06.924871 sshd[2849]: Invalid user xo from 52.148.221.37 port 34420 Feb 9 21:08:06.930876 sshd[2849]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:06.931889 sshd[2849]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:08:06.931975 sshd[2849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.148.221.37 Feb 9 21:08:06.932519 sshd[2849]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:06.931000 audit[2849]: USER_AUTH pid=2849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xo" exe="/usr/sbin/sshd" hostname=52.148.221.37 addr=52.148.221.37 terminal=ssh res=failed' Feb 9 21:08:07.024484 kernel: audit: type=1100 audit(1707512886.931:201): pid=2849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xo" exe="/usr/sbin/sshd" hostname=52.148.221.37 addr=52.148.221.37 terminal=ssh res=failed' Feb 9 21:08:08.654646 sshd[2849]: Failed password for invalid user xo from 52.148.221.37 port 34420 ssh2 Feb 9 21:08:10.638773 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:10.638Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:10.638773 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:10.638Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:10.649978 sshd[2849]: Received disconnect from 52.148.221.37 port 34420:11: Bye Bye [preauth] Feb 9 21:08:10.649978 sshd[2849]: Disconnected from invalid user xo 52.148.221.37 port 34420 [preauth] Feb 9 21:08:10.652384 systemd[1]: sshd@19-139.178.88.165:22-52.148.221.37:34420.service: Deactivated successfully. Feb 9 21:08:10.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.88.165:22-52.148.221.37:34420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:10.746643 kernel: audit: type=1131 audit(1707512890.652:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.88.165:22-52.148.221.37:34420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:15.639632 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:15.638Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:15.639632 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:15.638Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:18.213166 systemd[1]: Started sshd@20-139.178.88.165:22-85.209.11.226:43964.service. Feb 9 21:08:18.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.88.165:22-85.209.11.226:43964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:18.306638 kernel: audit: type=1130 audit(1707512898.212:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.88.165:22-85.209.11.226:43964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:19.178395 sshd[2873]: Invalid user remote from 85.209.11.226 port 43964 Feb 9 21:08:19.184516 sshd[2873]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:19.185305 sshd[2873]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:08:19.185345 sshd[2873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.226 Feb 9 21:08:19.185584 sshd[2873]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:19.185000 audit[2873]: USER_AUTH pid=2873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="remote" exe="/usr/sbin/sshd" hostname=85.209.11.226 addr=85.209.11.226 terminal=ssh res=failed' Feb 9 21:08:19.278632 kernel: audit: type=1100 audit(1707512899.185:204): pid=2873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="remote" exe="/usr/sbin/sshd" hostname=85.209.11.226 addr=85.209.11.226 terminal=ssh res=failed' Feb 9 21:08:20.640507 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:20.639Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:20.640507 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:20.639Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:21.695299 sshd[2873]: Failed password for invalid user remote from 85.209.11.226 port 43964 ssh2 Feb 9 21:08:23.835586 sshd[2873]: Received disconnect from 85.209.11.226 port 43964:11: Client disconnecting normally [preauth] Feb 9 21:08:23.835586 sshd[2873]: Disconnected from invalid user remote 85.209.11.226 port 43964 [preauth] Feb 9 21:08:23.837916 systemd[1]: sshd@20-139.178.88.165:22-85.209.11.226:43964.service: Deactivated successfully. Feb 9 21:08:23.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.88.165:22-85.209.11.226:43964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:23.931512 kernel: audit: type=1131 audit(1707512903.836:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.88.165:22-85.209.11.226:43964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:25.641261 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:25.640Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:25.641261 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:25.640Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:30.641558 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:30.640Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:30.641558 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:30.641Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:35.641932 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:35.641Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:35.641932 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:35.641Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:40.642628 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:40.642Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:40.642628 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:40.642Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:43.483931 systemd[1]: Started sshd@21-139.178.88.165:22-152.136.41.37:58612.service. Feb 9 21:08:43.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.88.165:22-152.136.41.37:58612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:43.576643 kernel: audit: type=1130 audit(1707512923.483:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.88.165:22-152.136.41.37:58612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:45.642875 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:45.642Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:45.642875 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:45.642Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:49.975636 systemd[1]: Started sshd@22-139.178.88.165:22-35.219.62.194:36796.service. Feb 9 21:08:49.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.88.165:22-35.219.62.194:36796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:50.068453 kernel: audit: type=1130 audit(1707512929.974:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.88.165:22-35.219.62.194:36796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:50.643467 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:50.642Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:50.643467 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:50.642Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:50.998383 sshd[2920]: Invalid user dyna from 35.219.62.194 port 36796 Feb 9 21:08:51.004482 sshd[2920]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:51.005562 sshd[2920]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:08:51.005651 sshd[2920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.219.62.194 Feb 9 21:08:51.006525 sshd[2920]: pam_faillock(sshd:auth): User unknown Feb 9 21:08:51.005000 audit[2920]: USER_AUTH pid=2920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dyna" exe="/usr/sbin/sshd" hostname=35.219.62.194 addr=35.219.62.194 terminal=ssh res=failed' Feb 9 21:08:51.099629 kernel: audit: type=1100 audit(1707512931.005:208): pid=2920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dyna" exe="/usr/sbin/sshd" hostname=35.219.62.194 addr=35.219.62.194 terminal=ssh res=failed' Feb 9 21:08:52.909292 sshd[2920]: Failed password for invalid user dyna from 35.219.62.194 port 36796 ssh2 Feb 9 21:08:53.171975 sshd[2920]: Received disconnect from 35.219.62.194 port 36796:11: Bye Bye [preauth] Feb 9 21:08:53.171975 sshd[2920]: Disconnected from invalid user dyna 35.219.62.194 port 36796 [preauth] Feb 9 21:08:53.174355 systemd[1]: sshd@22-139.178.88.165:22-35.219.62.194:36796.service: Deactivated successfully. Feb 9 21:08:53.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.88.165:22-35.219.62.194:36796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:53.268622 kernel: audit: type=1131 audit(1707512933.173:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.88.165:22-35.219.62.194:36796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:08:55.644689 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:55.644Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:08:55.644689 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:08:55.644Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:00.644907 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:00.644Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:00.644907 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:00.644Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:03.308243 systemd[1]: Started sshd@23-139.178.88.165:22-61.177.172.136:55359.service. Feb 9 21:09:03.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.88.165:22-61.177.172.136:55359 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:03.402651 kernel: audit: type=1130 audit(1707512943.306:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.88.165:22-61.177.172.136:55359 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:03.491801 systemd[1]: Started sshd@24-139.178.88.165:22-43.153.48.160:46564.service. Feb 9 21:09:03.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.88.165:22-43.153.48.160:46564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:03.584643 kernel: audit: type=1130 audit(1707512943.490:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.88.165:22-43.153.48.160:46564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:03.638423 sshd[2945]: Invalid user m10 from 43.153.48.160 port 46564 Feb 9 21:09:03.639835 sshd[2945]: pam_faillock(sshd:auth): User unknown Feb 9 21:09:03.640087 sshd[2945]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:09:03.640109 sshd[2945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.48.160 Feb 9 21:09:03.640335 sshd[2945]: pam_faillock(sshd:auth): User unknown Feb 9 21:09:03.638000 audit[2945]: USER_AUTH pid=2945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="m10" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:09:03.732638 kernel: audit: type=1100 audit(1707512943.638:212): pid=2945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="m10" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:09:04.305130 sshd[2942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:09:04.303000 audit[2942]: USER_AUTH pid=2942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:04.398629 kernel: audit: type=1100 audit(1707512944.303:213): pid=2942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:05.191482 sshd[2945]: Failed password for invalid user m10 from 43.153.48.160 port 46564 ssh2 Feb 9 21:09:05.612287 sshd[2945]: Received disconnect from 43.153.48.160 port 46564:11: Bye Bye [preauth] Feb 9 21:09:05.612287 sshd[2945]: Disconnected from invalid user m10 43.153.48.160 port 46564 [preauth] Feb 9 21:09:05.614634 systemd[1]: sshd@24-139.178.88.165:22-43.153.48.160:46564.service: Deactivated successfully. Feb 9 21:09:05.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.88.165:22-43.153.48.160:46564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:05.645527 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:05.645Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:05.645527 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:05.645Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:05.708632 kernel: audit: type=1131 audit(1707512945.613:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.88.165:22-43.153.48.160:46564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:05.992279 sshd[2942]: Failed password for root from 61.177.172.136 port 55359 ssh2 Feb 9 21:09:06.145000 audit[2942]: USER_AUTH pid=2942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:06.240780 kernel: audit: type=1100 audit(1707512946.145:215): pid=2942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:07.648442 sshd[2911]: Connection closed by 152.136.41.37 port 58612 [preauth] Feb 9 21:09:07.648883 systemd[1]: sshd@21-139.178.88.165:22-152.136.41.37:58612.service: Deactivated successfully. Feb 9 21:09:07.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.88.165:22-152.136.41.37:58612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:07.741637 kernel: audit: type=1131 audit(1707512947.647:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.88.165:22-152.136.41.37:58612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:08.109518 sshd[2942]: Failed password for root from 61.177.172.136 port 55359 ssh2 Feb 9 21:09:08.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.88.165:22-52.148.221.37:49722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:08.109887 systemd[1]: Started sshd@25-139.178.88.165:22-52.148.221.37:49722.service. Feb 9 21:09:08.203452 kernel: audit: type=1130 audit(1707512948.108:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.88.165:22-52.148.221.37:49722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:08.981254 sshd[2956]: Invalid user sinczak from 52.148.221.37 port 49722 Feb 9 21:09:08.987230 sshd[2956]: pam_faillock(sshd:auth): User unknown Feb 9 21:09:08.988219 sshd[2956]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:09:08.988309 sshd[2956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.148.221.37 Feb 9 21:09:08.989230 sshd[2956]: pam_faillock(sshd:auth): User unknown Feb 9 21:09:08.987000 audit[2956]: USER_AUTH pid=2956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sinczak" exe="/usr/sbin/sshd" hostname=52.148.221.37 addr=52.148.221.37 terminal=ssh res=failed' Feb 9 21:09:09.082643 kernel: audit: type=1100 audit(1707512948.987:218): pid=2956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sinczak" exe="/usr/sbin/sshd" hostname=52.148.221.37 addr=52.148.221.37 terminal=ssh res=failed' Feb 9 21:09:09.677000 audit[2942]: USER_AUTH pid=2942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:09.770491 kernel: audit: type=1100 audit(1707512949.677:219): pid=2942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:10.224683 sshd[2956]: Failed password for invalid user sinczak from 52.148.221.37 port 49722 ssh2 Feb 9 21:09:10.646019 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:10.645Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:10.646019 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:10.645Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:11.028102 sshd[2956]: Received disconnect from 52.148.221.37 port 49722:11: Bye Bye [preauth] Feb 9 21:09:11.028102 sshd[2956]: Disconnected from invalid user sinczak 52.148.221.37 port 49722 [preauth] Feb 9 21:09:11.030588 systemd[1]: sshd@25-139.178.88.165:22-52.148.221.37:49722.service: Deactivated successfully. Feb 9 21:09:11.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.88.165:22-52.148.221.37:49722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:11.124556 kernel: audit: type=1131 audit(1707512951.029:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.88.165:22-52.148.221.37:49722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:11.385948 sshd[2942]: Failed password for root from 61.177.172.136 port 55359 ssh2 Feb 9 21:09:13.210892 sshd[2942]: Received disconnect from 61.177.172.136 port 55359:11: [preauth] Feb 9 21:09:13.210892 sshd[2942]: Disconnected from authenticating user root 61.177.172.136 port 55359 [preauth] Feb 9 21:09:13.211419 sshd[2942]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:09:13.213406 systemd[1]: sshd@23-139.178.88.165:22-61.177.172.136:55359.service: Deactivated successfully. Feb 9 21:09:13.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.88.165:22-61.177.172.136:55359 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:13.307544 kernel: audit: type=1131 audit(1707512953.212:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.88.165:22-61.177.172.136:55359 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:13.364766 systemd[1]: Started sshd@26-139.178.88.165:22-61.177.172.136:62450.service. Feb 9 21:09:13.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.88.165:22-61.177.172.136:62450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:13.458512 kernel: audit: type=1130 audit(1707512953.363:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.88.165:22-61.177.172.136:62450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:14.373308 sshd[2967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:09:14.372000 audit[2967]: USER_AUTH pid=2967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:14.466610 kernel: audit: type=1100 audit(1707512954.372:223): pid=2967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:15.646439 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:15.645Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:15.646439 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:15.645Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:16.100465 sshd[2967]: Failed password for root from 61.177.172.136 port 62450 ssh2 Feb 9 21:09:17.905000 audit[2967]: USER_AUTH pid=2967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:18.000647 kernel: audit: type=1100 audit(1707512957.905:224): pid=2967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:20.045653 sshd[2967]: Failed password for root from 61.177.172.136 port 62450 ssh2 Feb 9 21:09:20.647296 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:20.646Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:20.647296 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:20.646Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:21.439000 audit[2967]: USER_AUTH pid=2967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:21.533498 kernel: audit: type=1100 audit(1707512961.439:225): pid=2967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:23.127842 sshd[2967]: Failed password for root from 61.177.172.136 port 62450 ssh2 Feb 9 21:09:23.283086 sshd[2967]: Received disconnect from 61.177.172.136 port 62450:11: [preauth] Feb 9 21:09:23.283086 sshd[2967]: Disconnected from authenticating user root 61.177.172.136 port 62450 [preauth] Feb 9 21:09:23.283600 sshd[2967]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:09:23.285620 systemd[1]: sshd@26-139.178.88.165:22-61.177.172.136:62450.service: Deactivated successfully. Feb 9 21:09:23.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.88.165:22-61.177.172.136:62450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:23.378638 kernel: audit: type=1131 audit(1707512963.284:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.88.165:22-61.177.172.136:62450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:23.439091 systemd[1]: Started sshd@27-139.178.88.165:22-61.177.172.136:16768.service. Feb 9 21:09:23.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.88.165:22-61.177.172.136:16768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:23.532647 kernel: audit: type=1130 audit(1707512963.437:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.88.165:22-61.177.172.136:16768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:24.449962 sshd[2984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:09:24.448000 audit[2984]: USER_AUTH pid=2984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:24.542629 kernel: audit: type=1100 audit(1707512964.448:228): pid=2984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:25.648110 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:25.647Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:25.648110 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:25.647Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:26.884594 sshd[2984]: Failed password for root from 61.177.172.136 port 16768 ssh2 Feb 9 21:09:27.982000 audit[2984]: USER_AUTH pid=2984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:28.075638 kernel: audit: type=1100 audit(1707512967.982:229): pid=2984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:29.494763 sshd[2984]: Failed password for root from 61.177.172.136 port 16768 ssh2 Feb 9 21:09:29.825000 audit[2984]: USER_AUTH pid=2984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:29.919501 kernel: audit: type=1100 audit(1707512969.825:230): pid=2984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:09:30.648590 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:30.647Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:30.648590 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:30.648Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:31.945429 sshd[2984]: Failed password for root from 61.177.172.136 port 16768 ssh2 Feb 9 21:09:33.359801 sshd[2984]: Received disconnect from 61.177.172.136 port 16768:11: [preauth] Feb 9 21:09:33.359801 sshd[2984]: Disconnected from authenticating user root 61.177.172.136 port 16768 [preauth] Feb 9 21:09:33.360313 sshd[2984]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:09:33.362274 systemd[1]: sshd@27-139.178.88.165:22-61.177.172.136:16768.service: Deactivated successfully. Feb 9 21:09:33.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.88.165:22-61.177.172.136:16768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:33.456642 kernel: audit: type=1131 audit(1707512973.361:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.88.165:22-61.177.172.136:16768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:35.649521 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:35.648Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:35.649521 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:35.649Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:40.650661 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:40.650Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:40.650661 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:40.650Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:45.651488 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:45.650Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:45.651488 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:45.650Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:49.081147 sshd[2819]: Timeout before authentication for 152.136.41.37 port 50538 Feb 9 21:09:49.082716 systemd[1]: sshd@16-139.178.88.165:22-152.136.41.37:50538.service: Deactivated successfully. Feb 9 21:09:49.180082 kernel: audit: type=1131 audit(1707512989.081:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.88.165:22-152.136.41.37:50538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:49.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.88.165:22-152.136.41.37:50538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:09:50.652184 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:50.651Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:50.652184 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:50.651Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:55.652834 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:55.652Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:09:55.652834 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:09:55.652Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:00.653423 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:00.652Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:00.653423 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:00.652Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:05.654519 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:05.653Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:05.654519 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:05.654Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:10.654831 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:10.654Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:10.654831 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:10.654Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:13.967226 systemd[1]: Started sshd@28-139.178.88.165:22-52.148.221.37:37090.service. Feb 9 21:10:13.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.88.165:22-52.148.221.37:37090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:14.060506 kernel: audit: type=1130 audit(1707513013.966:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.88.165:22-52.148.221.37:37090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:14.843660 sshd[3062]: Invalid user subsquid from 52.148.221.37 port 37090 Feb 9 21:10:14.849621 sshd[3062]: pam_faillock(sshd:auth): User unknown Feb 9 21:10:14.850435 sshd[3062]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:10:14.850491 sshd[3062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.148.221.37 Feb 9 21:10:14.850743 sshd[3062]: pam_faillock(sshd:auth): User unknown Feb 9 21:10:14.849000 audit[3062]: USER_AUTH pid=3062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="subsquid" exe="/usr/sbin/sshd" hostname=52.148.221.37 addr=52.148.221.37 terminal=ssh res=failed' Feb 9 21:10:14.944628 kernel: audit: type=1100 audit(1707513014.849:234): pid=3062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="subsquid" exe="/usr/sbin/sshd" hostname=52.148.221.37 addr=52.148.221.37 terminal=ssh res=failed' Feb 9 21:10:15.600381 systemd[1]: Started sshd@29-139.178.88.165:22-218.92.0.112:52467.service. Feb 9 21:10:15.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.88.165:22-218.92.0.112:52467 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:15.655846 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:15.655Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:15.655846 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:15.655Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:15.693451 kernel: audit: type=1130 audit(1707513015.599:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.88.165:22-218.92.0.112:52467 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:16.581579 sshd[3065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:10:16.580000 audit[3065]: USER_AUTH pid=3065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:16.674636 kernel: audit: type=1100 audit(1707513016.580:236): pid=3065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:16.813715 sshd[3062]: Failed password for invalid user subsquid from 52.148.221.37 port 37090 ssh2 Feb 9 21:10:17.206989 sshd[3062]: Received disconnect from 52.148.221.37 port 37090:11: Bye Bye [preauth] Feb 9 21:10:17.206989 sshd[3062]: Disconnected from invalid user subsquid 52.148.221.37 port 37090 [preauth] Feb 9 21:10:17.209420 systemd[1]: sshd@28-139.178.88.165:22-52.148.221.37:37090.service: Deactivated successfully. Feb 9 21:10:17.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.88.165:22-52.148.221.37:37090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:17.303640 kernel: audit: type=1131 audit(1707513017.208:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.88.165:22-52.148.221.37:37090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:18.153274 sshd[3065]: Failed password for root from 218.92.0.112 port 52467 ssh2 Feb 9 21:10:18.417000 audit[3065]: USER_AUTH pid=3065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:18.511510 kernel: audit: type=1100 audit(1707513018.417:238): pid=3065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:20.656639 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:20.656Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:20.656639 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:20.656Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:20.932735 sshd[3065]: Failed password for root from 218.92.0.112 port 52467 ssh2 Feb 9 21:10:21.945000 audit[3065]: USER_AUTH pid=3065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:22.039632 kernel: audit: type=1100 audit(1707513021.945:239): pid=3065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:22.977820 systemd[1]: Started sshd@30-139.178.88.165:22-43.153.48.160:52788.service. Feb 9 21:10:22.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.88.165:22-43.153.48.160:52788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:23.071631 kernel: audit: type=1130 audit(1707513022.976:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.88.165:22-43.153.48.160:52788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:23.127420 sshd[3077]: Invalid user fariborz from 43.153.48.160 port 52788 Feb 9 21:10:23.133508 sshd[3077]: pam_faillock(sshd:auth): User unknown Feb 9 21:10:23.134700 sshd[3077]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:10:23.134793 sshd[3077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.48.160 Feb 9 21:10:23.135792 sshd[3077]: pam_faillock(sshd:auth): User unknown Feb 9 21:10:23.134000 audit[3077]: USER_AUTH pid=3077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fariborz" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:10:23.232546 kernel: audit: type=1100 audit(1707513023.134:241): pid=3077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fariborz" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:10:23.538316 sshd[3065]: Failed password for root from 218.92.0.112 port 52467 ssh2 Feb 9 21:10:23.783248 sshd[3065]: Received disconnect from 218.92.0.112 port 52467:11: [preauth] Feb 9 21:10:23.783248 sshd[3065]: Disconnected from authenticating user root 218.92.0.112 port 52467 [preauth] Feb 9 21:10:23.783795 sshd[3065]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:10:23.785785 systemd[1]: sshd@29-139.178.88.165:22-218.92.0.112:52467.service: Deactivated successfully. Feb 9 21:10:23.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.88.165:22-218.92.0.112:52467 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:23.879620 kernel: audit: type=1131 audit(1707513023.784:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.88.165:22-218.92.0.112:52467 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:23.925741 systemd[1]: Started sshd@31-139.178.88.165:22-218.92.0.112:50310.service. Feb 9 21:10:23.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.88.165:22-218.92.0.112:50310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:24.019648 kernel: audit: type=1130 audit(1707513023.924:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.88.165:22-218.92.0.112:50310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:24.877429 sshd[3085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:10:24.876000 audit[3085]: USER_AUTH pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:24.970629 kernel: audit: type=1100 audit(1707513024.876:244): pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:25.333873 sshd[3077]: Failed password for invalid user fariborz from 43.153.48.160 port 52788 ssh2 Feb 9 21:10:25.657168 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:25.656Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:25.657168 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:25.656Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:25.948018 sshd[3077]: Received disconnect from 43.153.48.160 port 52788:11: Bye Bye [preauth] Feb 9 21:10:25.948018 sshd[3077]: Disconnected from invalid user fariborz 43.153.48.160 port 52788 [preauth] Feb 9 21:10:25.950518 systemd[1]: sshd@30-139.178.88.165:22-43.153.48.160:52788.service: Deactivated successfully. Feb 9 21:10:25.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.88.165:22-43.153.48.160:52788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:26.043623 kernel: audit: type=1131 audit(1707513025.949:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.88.165:22-43.153.48.160:52788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:26.880715 sshd[3085]: Failed password for root from 218.92.0.112 port 50310 ssh2 Feb 9 21:10:28.400000 audit[3085]: USER_AUTH pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:28.492606 kernel: audit: type=1100 audit(1707513028.400:246): pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:29.952355 sshd[3085]: Failed password for root from 218.92.0.112 port 50310 ssh2 Feb 9 21:10:30.236000 audit[3085]: USER_AUTH pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:30.329503 kernel: audit: type=1100 audit(1707513030.236:247): pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:30.658336 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:30.657Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:30.658336 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:30.657Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:32.731002 sshd[3085]: Failed password for root from 218.92.0.112 port 50310 ssh2 Feb 9 21:10:33.759686 sshd[3085]: Received disconnect from 218.92.0.112 port 50310:11: [preauth] Feb 9 21:10:33.759686 sshd[3085]: Disconnected from authenticating user root 218.92.0.112 port 50310 [preauth] Feb 9 21:10:33.760206 sshd[3085]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:10:33.762238 systemd[1]: sshd@31-139.178.88.165:22-218.92.0.112:50310.service: Deactivated successfully. Feb 9 21:10:33.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.88.165:22-218.92.0.112:50310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:33.855528 kernel: audit: type=1131 audit(1707513033.762:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.88.165:22-218.92.0.112:50310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:33.911200 systemd[1]: Started sshd@32-139.178.88.165:22-218.92.0.112:56721.service. Feb 9 21:10:33.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.88.165:22-218.92.0.112:56721 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:34.004628 kernel: audit: type=1130 audit(1707513033.910:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.88.165:22-218.92.0.112:56721 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:34.885502 sshd[3102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:10:34.885000 audit[3102]: USER_AUTH pid=3102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:34.978631 kernel: audit: type=1100 audit(1707513034.885:250): pid=3102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:35.658499 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:35.657Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:35.658499 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:35.658Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:36.928830 sshd[3102]: Failed password for root from 218.92.0.112 port 56721 ssh2 Feb 9 21:10:38.412000 audit[3102]: USER_AUTH pid=3102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:38.505633 kernel: audit: type=1100 audit(1707513038.412:251): pid=3102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:40.004944 sshd[3102]: Failed password for root from 218.92.0.112 port 56721 ssh2 Feb 9 21:10:40.249000 audit[3102]: USER_AUTH pid=3102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:40.342494 kernel: audit: type=1100 audit(1707513040.249:252): pid=3102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:10:40.659413 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:40.658Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:40.659413 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:40.658Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:42.117924 sshd[3102]: Failed password for root from 218.92.0.112 port 56721 ssh2 Feb 9 21:10:43.778036 sshd[3102]: Received disconnect from 218.92.0.112 port 56721:11: [preauth] Feb 9 21:10:43.778036 sshd[3102]: Disconnected from authenticating user root 218.92.0.112 port 56721 [preauth] Feb 9 21:10:43.778561 sshd[3102]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:10:43.780576 systemd[1]: sshd@32-139.178.88.165:22-218.92.0.112:56721.service: Deactivated successfully. Feb 9 21:10:43.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.88.165:22-218.92.0.112:56721 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:43.873511 kernel: audit: type=1131 audit(1707513043.779:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.88.165:22-218.92.0.112:56721 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:10:45.659721 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:45.659Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:45.659721 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:45.659Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:50.660075 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:50.659Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:50.660075 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:50.659Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:55.661128 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:55.660Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:10:55.661128 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:10:55.660Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:00.661935 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:00.661Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:00.661935 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:00.661Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:05.662096 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:05.661Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:05.662096 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:05.661Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:10.662318 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:10.661Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:10.662318 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:10.661Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:10.845068 systemd[1]: Started sshd@33-139.178.88.165:22-2.57.122.87:52298.service. Feb 9 21:11:10.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.88.165:22-2.57.122.87:52298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:11:10.937477 kernel: audit: type=1130 audit(1707513070.843:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.88.165:22-2.57.122.87:52298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:11:11.559330 sshd[3148]: Invalid user fjiang from 2.57.122.87 port 52298 Feb 9 21:11:11.737869 sshd[3148]: pam_faillock(sshd:auth): User unknown Feb 9 21:11:11.738998 sshd[3148]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:11:11.739089 sshd[3148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 9 21:11:11.740165 sshd[3148]: pam_faillock(sshd:auth): User unknown Feb 9 21:11:11.738000 audit[3148]: USER_AUTH pid=3148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fjiang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 9 21:11:11.832517 kernel: audit: type=1100 audit(1707513071.738:255): pid=3148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fjiang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 9 21:11:13.527498 sshd[3148]: Failed password for invalid user fjiang from 2.57.122.87 port 52298 ssh2 Feb 9 21:11:14.720041 sshd[3148]: Connection closed by invalid user fjiang 2.57.122.87 port 52298 [preauth] Feb 9 21:11:14.722567 systemd[1]: sshd@33-139.178.88.165:22-2.57.122.87:52298.service: Deactivated successfully. Feb 9 21:11:14.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.88.165:22-2.57.122.87:52298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:11:14.816648 kernel: audit: type=1131 audit(1707513074.722:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.88.165:22-2.57.122.87:52298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:11:15.663069 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:15.662Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:15.663069 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:15.662Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:20.663354 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:20.662Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:20.663354 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:20.662Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:25.664109 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:25.663Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:25.664109 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:25.663Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:30.664745 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:30.664Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:30.664745 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:30.664Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:35.665268 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:35.664Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:35.665268 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:35.664Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:40.665887 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:40.665Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:40.665887 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:40.665Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:44.074344 systemd[1]: Started sshd@34-139.178.88.165:22-43.153.48.160:49886.service. Feb 9 21:11:44.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.88.165:22-43.153.48.160:49886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:11:44.167524 kernel: audit: type=1130 audit(1707513104.072:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.88.165:22-43.153.48.160:49886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:11:44.219472 sshd[3203]: Invalid user sinczak from 43.153.48.160 port 49886 Feb 9 21:11:44.220863 sshd[3203]: pam_faillock(sshd:auth): User unknown Feb 9 21:11:44.221120 sshd[3203]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:11:44.221143 sshd[3203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.48.160 Feb 9 21:11:44.221366 sshd[3203]: pam_faillock(sshd:auth): User unknown Feb 9 21:11:44.219000 audit[3203]: USER_AUTH pid=3203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sinczak" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:11:44.312677 kernel: audit: type=1100 audit(1707513104.219:258): pid=3203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sinczak" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:11:45.666237 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:45.665Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:45.666237 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:45.665Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:45.873086 sshd[3203]: Failed password for invalid user sinczak from 43.153.48.160 port 49886 ssh2 Feb 9 21:11:46.120945 sshd[3203]: Received disconnect from 43.153.48.160 port 49886:11: Bye Bye [preauth] Feb 9 21:11:46.120945 sshd[3203]: Disconnected from invalid user sinczak 43.153.48.160 port 49886 [preauth] Feb 9 21:11:46.123421 systemd[1]: sshd@34-139.178.88.165:22-43.153.48.160:49886.service: Deactivated successfully. Feb 9 21:11:46.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.88.165:22-43.153.48.160:49886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:11:46.217648 kernel: audit: type=1131 audit(1707513106.122:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.88.165:22-43.153.48.160:49886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:11:50.666642 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:50.666Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:50.666642 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:50.666Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:55.667557 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:55.666Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:11:55.667557 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:11:55.667Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:00.668233 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:00.667Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:00.668233 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:00.667Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:05.669367 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:05.668Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:05.669367 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:05.668Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:10.669563 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:10.668Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:10.669563 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:10.669Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:15.669938 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:15.669Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:15.669938 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:15.669Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:20.670686 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:20.670Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:20.670686 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:20.670Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:25.671684 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:25.671Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:25.671684 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:25.671Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:30.672762 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:30.672Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:30.672762 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:30.672Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:35.673812 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:35.673Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:35.673812 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:35.673Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:40.674238 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:40.673Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:40.674238 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:40.673Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:45.675093 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:45.674Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:45.675093 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:45.674Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:50.675568 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:50.674Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:50.675568 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:50.675Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:55.675835 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:55.675Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:12:55.675835 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:12:55.675Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:00.675961 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:00.675Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:00.675961 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:00.675Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:05.285794 systemd[1]: Started sshd@35-139.178.88.165:22-43.153.48.160:60222.service. Feb 9 21:13:05.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.88.165:22-43.153.48.160:60222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:13:05.377497 kernel: audit: type=1130 audit(1707513185.285:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.88.165:22-43.153.48.160:60222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:13:05.430096 sshd[3307]: Invalid user benq from 43.153.48.160 port 60222 Feb 9 21:13:05.431433 sshd[3307]: pam_faillock(sshd:auth): User unknown Feb 9 21:13:05.431681 sshd[3307]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:13:05.431701 sshd[3307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.48.160 Feb 9 21:13:05.431920 sshd[3307]: pam_faillock(sshd:auth): User unknown Feb 9 21:13:05.431000 audit[3307]: USER_AUTH pid=3307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="benq" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:13:05.524642 kernel: audit: type=1100 audit(1707513185.431:261): pid=3307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="benq" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:13:05.676416 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:05.675Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:05.676416 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:05.675Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:07.203824 sshd[3307]: Failed password for invalid user benq from 43.153.48.160 port 60222 ssh2 Feb 9 21:13:08.976547 sshd[3307]: Received disconnect from 43.153.48.160 port 60222:11: Bye Bye [preauth] Feb 9 21:13:08.976547 sshd[3307]: Disconnected from invalid user benq 43.153.48.160 port 60222 [preauth] Feb 9 21:13:08.979074 systemd[1]: sshd@35-139.178.88.165:22-43.153.48.160:60222.service: Deactivated successfully. Feb 9 21:13:08.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.88.165:22-43.153.48.160:60222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:13:09.072640 kernel: audit: type=1131 audit(1707513188.979:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.88.165:22-43.153.48.160:60222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:13:10.676487 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:10.675Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:10.676487 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:10.676Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:15.677197 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:15.676Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:15.677197 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:15.676Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:20.678095 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:20.677Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:20.678095 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:20.677Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:25.679191 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:25.678Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:25.679191 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:25.678Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:30.679546 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:30.678Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:30.679546 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:30.679Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:35.680421 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:35.679Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:35.680421 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:35.679Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:40.680680 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:40.680Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:40.680680 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:40.680Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:45.680789 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:45.680Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:45.680789 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:45.680Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:50.681067 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:50.680Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:50.681067 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:50.680Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:55.681874 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:55.681Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:13:55.681874 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:13:55.681Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:00.682723 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:00.682Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:00.682723 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:00.682Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:05.682823 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:05.682Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:05.682823 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:05.682Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:10.683531 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:10.682Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:10.683531 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:10.683Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:15.684490 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:15.683Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:15.684490 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:15.683Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:20.685617 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:20.684Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:20.685617 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:20.685Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:25.492116 systemd[1]: Started sshd@36-139.178.88.165:22-43.153.48.160:47904.service. Feb 9 21:14:25.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.88.165:22-43.153.48.160:47904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:14:25.584453 kernel: audit: type=1130 audit(1707513265.490:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.88.165:22-43.153.48.160:47904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:14:25.636356 sshd[3415]: Invalid user shiva1 from 43.153.48.160 port 47904 Feb 9 21:14:25.637717 sshd[3415]: pam_faillock(sshd:auth): User unknown Feb 9 21:14:25.637961 sshd[3415]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:14:25.637982 sshd[3415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.48.160 Feb 9 21:14:25.638201 sshd[3415]: pam_faillock(sshd:auth): User unknown Feb 9 21:14:25.636000 audit[3415]: USER_AUTH pid=3415 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shiva1" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:14:25.685727 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:25.685Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:25.685727 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:25.685Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:25.731513 kernel: audit: type=1100 audit(1707513265.636:264): pid=3415 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shiva1" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:14:27.726430 sshd[3415]: Failed password for invalid user shiva1 from 43.153.48.160 port 47904 ssh2 Feb 9 21:14:29.328716 sshd[3415]: Received disconnect from 43.153.48.160 port 47904:11: Bye Bye [preauth] Feb 9 21:14:29.328716 sshd[3415]: Disconnected from invalid user shiva1 43.153.48.160 port 47904 [preauth] Feb 9 21:14:29.331250 systemd[1]: sshd@36-139.178.88.165:22-43.153.48.160:47904.service: Deactivated successfully. Feb 9 21:14:29.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.88.165:22-43.153.48.160:47904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:14:29.425643 kernel: audit: type=1131 audit(1707513269.330:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.88.165:22-43.153.48.160:47904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:14:30.686293 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:30.685Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:30.686293 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:30.685Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:35.686816 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:35.686Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:35.686816 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:35.686Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:40.687595 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:40.687Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:40.687595 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:40.687Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:45.688233 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:45.687Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:45.688233 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:45.687Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:50.689099 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:50.688Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:50.689099 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:50.688Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:55.690112 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:55.689Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:14:55.690112 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:14:55.689Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:00.691114 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:00.690Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:00.691114 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:00.690Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:05.692189 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:05.691Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:05.692189 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:05.691Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:10.693194 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:10.692Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:10.693194 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:10.692Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:15.693771 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:15.693Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:15.693771 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:15.693Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:20.694601 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:20.694Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:20.694601 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:20.694Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:25.695018 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:25.694Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:25.695018 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:25.694Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:30.696056 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:30.695Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:30.696056 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:30.695Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:35.439082 update_engine[1162]: I0209 21:15:35.438954 1162 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 21:15:35.439082 update_engine[1162]: I0209 21:15:35.439033 1162 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 21:15:35.440718 update_engine[1162]: I0209 21:15:35.440635 1162 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 21:15:35.441536 update_engine[1162]: I0209 21:15:35.441491 1162 omaha_request_params.cc:62] Current group set to lts Feb 9 21:15:35.441855 update_engine[1162]: I0209 21:15:35.441785 1162 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 21:15:35.441855 update_engine[1162]: I0209 21:15:35.441804 1162 update_attempter.cc:643] Scheduling an action processor start. Feb 9 21:15:35.441855 update_engine[1162]: I0209 21:15:35.441836 1162 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 21:15:35.442258 update_engine[1162]: I0209 21:15:35.441898 1162 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 21:15:35.442258 update_engine[1162]: I0209 21:15:35.442041 1162 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 21:15:35.442258 update_engine[1162]: I0209 21:15:35.442059 1162 omaha_request_action.cc:271] Request: Feb 9 21:15:35.442258 update_engine[1162]: Feb 9 21:15:35.442258 update_engine[1162]: Feb 9 21:15:35.442258 update_engine[1162]: Feb 9 21:15:35.442258 update_engine[1162]: Feb 9 21:15:35.442258 update_engine[1162]: Feb 9 21:15:35.442258 update_engine[1162]: Feb 9 21:15:35.442258 update_engine[1162]: Feb 9 21:15:35.442258 update_engine[1162]: Feb 9 21:15:35.442258 update_engine[1162]: I0209 21:15:35.442067 1162 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:15:35.443356 locksmithd[1183]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 21:15:35.445165 update_engine[1162]: I0209 21:15:35.445082 1162 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:15:35.445377 update_engine[1162]: E0209 21:15:35.445307 1162 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:15:35.445513 update_engine[1162]: I0209 21:15:35.445483 1162 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 21:15:35.696775 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:35.696Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:35.696775 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:35.696Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:40.697658 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:40.696Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:40.697658 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:40.697Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:45.348847 update_engine[1162]: I0209 21:15:45.348722 1162 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:15:45.349638 update_engine[1162]: I0209 21:15:45.349184 1162 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:15:45.349638 update_engine[1162]: E0209 21:15:45.349385 1162 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:15:45.349638 update_engine[1162]: I0209 21:15:45.349606 1162 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 21:15:45.698485 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:45.697Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:45.698485 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:45.697Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:46.811197 systemd[1]: Started sshd@37-139.178.88.165:22-43.153.48.160:34146.service. Feb 9 21:15:46.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.88.165:22-43.153.48.160:34146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:15:46.904452 kernel: audit: type=1130 audit(1707513346.809:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.88.165:22-43.153.48.160:34146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:15:46.955284 sshd[3516]: Invalid user headom from 43.153.48.160 port 34146 Feb 9 21:15:46.956478 sshd[3516]: pam_faillock(sshd:auth): User unknown Feb 9 21:15:46.956697 sshd[3516]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:15:46.956716 sshd[3516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.48.160 Feb 9 21:15:46.956930 sshd[3516]: pam_faillock(sshd:auth): User unknown Feb 9 21:15:46.955000 audit[3516]: USER_AUTH pid=3516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="headom" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:15:47.048661 kernel: audit: type=1100 audit(1707513346.955:267): pid=3516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="headom" exe="/usr/sbin/sshd" hostname=43.153.48.160 addr=43.153.48.160 terminal=ssh res=failed' Feb 9 21:15:48.829500 sshd[3516]: Failed password for invalid user headom from 43.153.48.160 port 34146 ssh2 Feb 9 21:15:50.239322 sshd[3516]: Received disconnect from 43.153.48.160 port 34146:11: Bye Bye [preauth] Feb 9 21:15:50.239322 sshd[3516]: Disconnected from invalid user headom 43.153.48.160 port 34146 [preauth] Feb 9 21:15:50.241893 systemd[1]: sshd@37-139.178.88.165:22-43.153.48.160:34146.service: Deactivated successfully. Feb 9 21:15:50.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.88.165:22-43.153.48.160:34146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:15:50.335637 kernel: audit: type=1131 audit(1707513350.240:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.88.165:22-43.153.48.160:34146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:15:50.699406 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:50.698Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:50.699406 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:50.698Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:55.349070 update_engine[1162]: I0209 21:15:55.348932 1162 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:15:55.350012 update_engine[1162]: I0209 21:15:55.349395 1162 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:15:55.350012 update_engine[1162]: E0209 21:15:55.349638 1162 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:15:55.350012 update_engine[1162]: I0209 21:15:55.349807 1162 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 21:15:55.700410 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:55.699Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:15:55.700410 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:15:55.699Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:00.701413 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:00.700Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:00.701413 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:00.700Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:05.348982 update_engine[1162]: I0209 21:16:05.348909 1162 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:16:05.349804 update_engine[1162]: I0209 21:16:05.349388 1162 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:16:05.349804 update_engine[1162]: E0209 21:16:05.349639 1162 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:16:05.349804 update_engine[1162]: I0209 21:16:05.349783 1162 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 21:16:05.349804 update_engine[1162]: I0209 21:16:05.349798 1162 omaha_request_action.cc:621] Omaha request response: Feb 9 21:16:05.350227 update_engine[1162]: E0209 21:16:05.349936 1162 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 21:16:05.350227 update_engine[1162]: I0209 21:16:05.349964 1162 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 21:16:05.350227 update_engine[1162]: I0209 21:16:05.349975 1162 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:16:05.350227 update_engine[1162]: I0209 21:16:05.349983 1162 update_attempter.cc:306] Processing Done. Feb 9 21:16:05.350227 update_engine[1162]: E0209 21:16:05.350008 1162 update_attempter.cc:619] Update failed. Feb 9 21:16:05.350227 update_engine[1162]: I0209 21:16:05.350016 1162 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 21:16:05.350227 update_engine[1162]: I0209 21:16:05.350025 1162 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 21:16:05.350227 update_engine[1162]: I0209 21:16:05.350034 1162 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 21:16:05.350227 update_engine[1162]: I0209 21:16:05.350183 1162 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 21:16:05.350227 update_engine[1162]: I0209 21:16:05.350236 1162 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 21:16:05.351197 update_engine[1162]: I0209 21:16:05.350247 1162 omaha_request_action.cc:271] Request: Feb 9 21:16:05.351197 update_engine[1162]: Feb 9 21:16:05.351197 update_engine[1162]: Feb 9 21:16:05.351197 update_engine[1162]: Feb 9 21:16:05.351197 update_engine[1162]: Feb 9 21:16:05.351197 update_engine[1162]: Feb 9 21:16:05.351197 update_engine[1162]: Feb 9 21:16:05.351197 update_engine[1162]: I0209 21:16:05.350258 1162 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:16:05.351197 update_engine[1162]: I0209 21:16:05.350571 1162 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:16:05.351197 update_engine[1162]: E0209 21:16:05.350739 1162 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:16:05.351197 update_engine[1162]: I0209 21:16:05.350872 1162 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 21:16:05.351197 update_engine[1162]: I0209 21:16:05.350885 1162 omaha_request_action.cc:621] Omaha request response: Feb 9 21:16:05.351197 update_engine[1162]: I0209 21:16:05.350895 1162 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:16:05.351197 update_engine[1162]: I0209 21:16:05.350903 1162 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:16:05.351197 update_engine[1162]: I0209 21:16:05.350910 1162 update_attempter.cc:306] Processing Done. Feb 9 21:16:05.351197 update_engine[1162]: I0209 21:16:05.350917 1162 update_attempter.cc:310] Error event sent. Feb 9 21:16:05.351197 update_engine[1162]: I0209 21:16:05.350944 1162 update_check_scheduler.cc:74] Next update check in 40m7s Feb 9 21:16:05.352761 locksmithd[1183]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 21:16:05.352761 locksmithd[1183]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 21:16:05.701973 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:05.701Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:05.701973 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:05.701Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:10.702273 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:10.701Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:10.702273 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:10.701Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:15.703086 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:15.702Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:15.703086 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:15.702Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:20.703386 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:20.702Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:20.703386 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:20.702Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:25.704413 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:25.703Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:25.704413 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:25.703Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:30.704910 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:30.704Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:30.704910 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:30.704Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:35.706001 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:35.705Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:35.706001 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:35.705Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:40.707179 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:40.706Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:40.707179 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:40.706Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:45.707946 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:45.707Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:45.707946 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:45.707Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:50.708219 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:50.707Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:50.708219 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:50.707Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:55.709318 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:55.708Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:16:55.709318 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:16:55.708Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:17:00.710229 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:17:00.709Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:17:00.710229 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:17:00.709Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:17:05.710734 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:17:05.710Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:17:05.710734 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:17:05.710Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:17:10.711484 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:17:10.710Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"} Feb 9 21:17:10.711484 etcd-wrapper[2432]: {"level":"warn","ts":"2024-02-09T21:17:10.710Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"967872570d3885c9","rtt":"0s","error":"dial tcp 10.67.80.17:2380: i/o timeout"}