Feb 12 22:08:06.562308 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 12 22:08:06.562321 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 22:08:06.562327 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:08:06.562331 kernel: BIOS-provided physical RAM map: Feb 12 22:08:06.562335 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000008f7ff] usable Feb 12 22:08:06.562338 kernel: BIOS-e820: [mem 0x000000000008f800-0x000000000009ffff] reserved Feb 12 22:08:06.562343 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 12 22:08:06.562348 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 12 22:08:06.562351 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 12 22:08:06.562355 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000006eb22fff] usable Feb 12 22:08:06.562359 kernel: BIOS-e820: [mem 0x000000006eb23000-0x000000006eb23fff] ACPI NVS Feb 12 22:08:06.562363 kernel: BIOS-e820: [mem 0x000000006eb24000-0x000000006eb24fff] reserved Feb 12 22:08:06.562366 kernel: BIOS-e820: [mem 0x000000006eb25000-0x0000000077fc6fff] usable Feb 12 22:08:06.562370 kernel: BIOS-e820: [mem 0x0000000077fc7000-0x00000000790a9fff] reserved Feb 12 22:08:06.562376 kernel: BIOS-e820: [mem 0x00000000790aa000-0x0000000079232fff] usable Feb 12 22:08:06.562380 kernel: BIOS-e820: [mem 0x0000000079233000-0x0000000079664fff] ACPI NVS Feb 12 22:08:06.562385 kernel: BIOS-e820: [mem 0x0000000079665000-0x000000007befefff] reserved Feb 12 22:08:06.562389 kernel: BIOS-e820: [mem 0x000000007beff000-0x000000007befffff] usable Feb 12 22:08:06.562393 kernel: BIOS-e820: [mem 0x000000007bf00000-0x000000007f7fffff] reserved Feb 12 22:08:06.562397 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 12 22:08:06.562401 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 12 22:08:06.562405 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 12 22:08:06.562409 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 12 22:08:06.562414 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 12 22:08:06.562418 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087f7fffff] usable Feb 12 22:08:06.562422 kernel: NX (Execute Disable) protection: active Feb 12 22:08:06.562427 kernel: SMBIOS 3.2.1 present. Feb 12 22:08:06.562431 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 12 22:08:06.562435 kernel: tsc: Detected 3400.000 MHz processor Feb 12 22:08:06.562439 kernel: tsc: Detected 3399.906 MHz TSC Feb 12 22:08:06.562443 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 22:08:06.562448 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 22:08:06.562452 kernel: last_pfn = 0x87f800 max_arch_pfn = 0x400000000 Feb 12 22:08:06.562458 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 22:08:06.562462 kernel: last_pfn = 0x7bf00 max_arch_pfn = 0x400000000 Feb 12 22:08:06.562466 kernel: Using GB pages for direct mapping Feb 12 22:08:06.562471 kernel: ACPI: Early table checksum verification disabled Feb 12 22:08:06.562477 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 12 22:08:06.562482 kernel: ACPI: XSDT 0x00000000795460C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 12 22:08:06.562504 kernel: ACPI: FACP 0x0000000079582620 000114 (v06 01072009 AMI 00010013) Feb 12 22:08:06.562510 kernel: ACPI: DSDT 0x0000000079546268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 12 22:08:06.562516 kernel: ACPI: FACS 0x0000000079664F80 000040 Feb 12 22:08:06.562521 kernel: ACPI: APIC 0x0000000079582738 00012C (v04 01072009 AMI 00010013) Feb 12 22:08:06.562525 kernel: ACPI: FPDT 0x0000000079582868 000044 (v01 01072009 AMI 00010013) Feb 12 22:08:06.562544 kernel: ACPI: FIDT 0x00000000795828B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 12 22:08:06.562548 kernel: ACPI: MCFG 0x0000000079582950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 12 22:08:06.562553 kernel: ACPI: SPMI 0x0000000079582990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 12 22:08:06.562558 kernel: ACPI: SSDT 0x00000000795829D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 12 22:08:06.562563 kernel: ACPI: SSDT 0x00000000795844F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 12 22:08:06.562568 kernel: ACPI: SSDT 0x00000000795876C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 12 22:08:06.562572 kernel: ACPI: HPET 0x00000000795899F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 12 22:08:06.562577 kernel: ACPI: SSDT 0x0000000079589A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 12 22:08:06.562582 kernel: ACPI: SSDT 0x000000007958A9D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 12 22:08:06.562586 kernel: ACPI: UEFI 0x000000007958B2D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 12 22:08:06.562591 kernel: ACPI: LPIT 0x000000007958B318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 12 22:08:06.562596 kernel: ACPI: SSDT 0x000000007958B3B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 12 22:08:06.562601 kernel: ACPI: SSDT 0x000000007958DB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 12 22:08:06.562606 kernel: ACPI: DBGP 0x000000007958F078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 12 22:08:06.562610 kernel: ACPI: DBG2 0x000000007958F0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 12 22:08:06.562615 kernel: ACPI: SSDT 0x000000007958F108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 12 22:08:06.562620 kernel: ACPI: DMAR 0x0000000079590C70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 12 22:08:06.562624 kernel: ACPI: SSDT 0x0000000079590D18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 12 22:08:06.562629 kernel: ACPI: TPM2 0x0000000079590E60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 12 22:08:06.562634 kernel: ACPI: SSDT 0x0000000079590E98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 12 22:08:06.562639 kernel: ACPI: WSMT 0x0000000079591C28 000028 (v01 \xabn 01072009 AMI 00010013) Feb 12 22:08:06.562644 kernel: ACPI: EINJ 0x0000000079591C50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 12 22:08:06.562649 kernel: ACPI: ERST 0x0000000079591D80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 12 22:08:06.562654 kernel: ACPI: BERT 0x0000000079591FB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 12 22:08:06.562658 kernel: ACPI: HEST 0x0000000079591FE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 12 22:08:06.562663 kernel: ACPI: SSDT 0x0000000079592260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 12 22:08:06.562667 kernel: ACPI: Reserving FACP table memory at [mem 0x79582620-0x79582733] Feb 12 22:08:06.562672 kernel: ACPI: Reserving DSDT table memory at [mem 0x79546268-0x7958261e] Feb 12 22:08:06.562677 kernel: ACPI: Reserving FACS table memory at [mem 0x79664f80-0x79664fbf] Feb 12 22:08:06.562682 kernel: ACPI: Reserving APIC table memory at [mem 0x79582738-0x79582863] Feb 12 22:08:06.562687 kernel: ACPI: Reserving FPDT table memory at [mem 0x79582868-0x795828ab] Feb 12 22:08:06.562691 kernel: ACPI: Reserving FIDT table memory at [mem 0x795828b0-0x7958294b] Feb 12 22:08:06.562696 kernel: ACPI: Reserving MCFG table memory at [mem 0x79582950-0x7958298b] Feb 12 22:08:06.562701 kernel: ACPI: Reserving SPMI table memory at [mem 0x79582990-0x795829d0] Feb 12 22:08:06.562706 kernel: ACPI: Reserving SSDT table memory at [mem 0x795829d8-0x795844f3] Feb 12 22:08:06.562710 kernel: ACPI: Reserving SSDT table memory at [mem 0x795844f8-0x795876bd] Feb 12 22:08:06.562715 kernel: ACPI: Reserving SSDT table memory at [mem 0x795876c0-0x795899ea] Feb 12 22:08:06.562720 kernel: ACPI: Reserving HPET table memory at [mem 0x795899f0-0x79589a27] Feb 12 22:08:06.562725 kernel: ACPI: Reserving SSDT table memory at [mem 0x79589a28-0x7958a9d5] Feb 12 22:08:06.562730 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958a9d8-0x7958b2ce] Feb 12 22:08:06.562734 kernel: ACPI: Reserving UEFI table memory at [mem 0x7958b2d0-0x7958b311] Feb 12 22:08:06.562739 kernel: ACPI: Reserving LPIT table memory at [mem 0x7958b318-0x7958b3ab] Feb 12 22:08:06.562743 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958b3b0-0x7958db8d] Feb 12 22:08:06.562748 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958db90-0x7958f071] Feb 12 22:08:06.562753 kernel: ACPI: Reserving DBGP table memory at [mem 0x7958f078-0x7958f0ab] Feb 12 22:08:06.562757 kernel: ACPI: Reserving DBG2 table memory at [mem 0x7958f0b0-0x7958f103] Feb 12 22:08:06.562762 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958f108-0x79590c6e] Feb 12 22:08:06.562767 kernel: ACPI: Reserving DMAR table memory at [mem 0x79590c70-0x79590d17] Feb 12 22:08:06.562772 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590d18-0x79590e5b] Feb 12 22:08:06.562777 kernel: ACPI: Reserving TPM2 table memory at [mem 0x79590e60-0x79590e93] Feb 12 22:08:06.562781 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590e98-0x79591c26] Feb 12 22:08:06.562786 kernel: ACPI: Reserving WSMT table memory at [mem 0x79591c28-0x79591c4f] Feb 12 22:08:06.562791 kernel: ACPI: Reserving EINJ table memory at [mem 0x79591c50-0x79591d7f] Feb 12 22:08:06.562795 kernel: ACPI: Reserving ERST table memory at [mem 0x79591d80-0x79591faf] Feb 12 22:08:06.562800 kernel: ACPI: Reserving BERT table memory at [mem 0x79591fb0-0x79591fdf] Feb 12 22:08:06.562805 kernel: ACPI: Reserving HEST table memory at [mem 0x79591fe0-0x7959225b] Feb 12 22:08:06.562810 kernel: ACPI: Reserving SSDT table memory at [mem 0x79592260-0x795923c1] Feb 12 22:08:06.562815 kernel: No NUMA configuration found Feb 12 22:08:06.562820 kernel: Faking a node at [mem 0x0000000000000000-0x000000087f7fffff] Feb 12 22:08:06.562824 kernel: NODE_DATA(0) allocated [mem 0x87f7fa000-0x87f7fffff] Feb 12 22:08:06.562829 kernel: Zone ranges: Feb 12 22:08:06.562834 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 22:08:06.562838 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 12 22:08:06.562843 kernel: Normal [mem 0x0000000100000000-0x000000087f7fffff] Feb 12 22:08:06.562848 kernel: Movable zone start for each node Feb 12 22:08:06.562853 kernel: Early memory node ranges Feb 12 22:08:06.562858 kernel: node 0: [mem 0x0000000000001000-0x000000000008efff] Feb 12 22:08:06.562862 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 12 22:08:06.562867 kernel: node 0: [mem 0x0000000040400000-0x000000006eb22fff] Feb 12 22:08:06.562871 kernel: node 0: [mem 0x000000006eb25000-0x0000000077fc6fff] Feb 12 22:08:06.562876 kernel: node 0: [mem 0x00000000790aa000-0x0000000079232fff] Feb 12 22:08:06.562881 kernel: node 0: [mem 0x000000007beff000-0x000000007befffff] Feb 12 22:08:06.562885 kernel: node 0: [mem 0x0000000100000000-0x000000087f7fffff] Feb 12 22:08:06.562890 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087f7fffff] Feb 12 22:08:06.562899 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 22:08:06.562904 kernel: On node 0, zone DMA: 113 pages in unavailable ranges Feb 12 22:08:06.562909 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 12 22:08:06.562914 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 12 22:08:06.562920 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 12 22:08:06.562924 kernel: On node 0, zone DMA32: 11468 pages in unavailable ranges Feb 12 22:08:06.562930 kernel: On node 0, zone Normal: 16640 pages in unavailable ranges Feb 12 22:08:06.562935 kernel: On node 0, zone Normal: 2048 pages in unavailable ranges Feb 12 22:08:06.562941 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 12 22:08:06.562946 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 12 22:08:06.562951 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 12 22:08:06.562956 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 12 22:08:06.562961 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 12 22:08:06.562966 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 12 22:08:06.562971 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 12 22:08:06.562976 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 12 22:08:06.562980 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 12 22:08:06.562986 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 12 22:08:06.562991 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 12 22:08:06.562996 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 12 22:08:06.563001 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 12 22:08:06.563006 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 12 22:08:06.563011 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 12 22:08:06.563016 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 12 22:08:06.563021 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 12 22:08:06.563026 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 12 22:08:06.563031 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 22:08:06.563037 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 22:08:06.563042 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 22:08:06.563047 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 22:08:06.563052 kernel: TSC deadline timer available Feb 12 22:08:06.563057 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 12 22:08:06.563062 kernel: [mem 0x7f800000-0xdfffffff] available for PCI devices Feb 12 22:08:06.563067 kernel: Booting paravirtualized kernel on bare hardware Feb 12 22:08:06.563072 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 22:08:06.563078 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 12 22:08:06.563083 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 12 22:08:06.563088 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 12 22:08:06.563093 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 12 22:08:06.563098 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8222329 Feb 12 22:08:06.563103 kernel: Policy zone: Normal Feb 12 22:08:06.563109 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:08:06.563114 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 22:08:06.563120 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 12 22:08:06.563125 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 12 22:08:06.563130 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 22:08:06.563135 kernel: Memory: 32683740K/33411956K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 727960K reserved, 0K cma-reserved) Feb 12 22:08:06.563140 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 12 22:08:06.563145 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 22:08:06.563150 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 22:08:06.563155 kernel: rcu: Hierarchical RCU implementation. Feb 12 22:08:06.563160 kernel: rcu: RCU event tracing is enabled. Feb 12 22:08:06.563166 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 12 22:08:06.563171 kernel: Rude variant of Tasks RCU enabled. Feb 12 22:08:06.563176 kernel: Tracing variant of Tasks RCU enabled. Feb 12 22:08:06.563181 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 22:08:06.563186 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 12 22:08:06.563191 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 12 22:08:06.563196 kernel: random: crng init done Feb 12 22:08:06.563201 kernel: Console: colour dummy device 80x25 Feb 12 22:08:06.563206 kernel: printk: console [tty0] enabled Feb 12 22:08:06.563212 kernel: printk: console [ttyS1] enabled Feb 12 22:08:06.563217 kernel: ACPI: Core revision 20210730 Feb 12 22:08:06.563222 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 12 22:08:06.563227 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 22:08:06.563232 kernel: DMAR: Host address width 39 Feb 12 22:08:06.563237 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 12 22:08:06.563242 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 12 22:08:06.563247 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 12 22:08:06.563252 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 12 22:08:06.563258 kernel: DMAR: RMRR base: 0x00000079f11000 end: 0x0000007a15afff Feb 12 22:08:06.563263 kernel: DMAR: RMRR base: 0x0000007d000000 end: 0x0000007f7fffff Feb 12 22:08:06.563268 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 12 22:08:06.563273 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 12 22:08:06.563278 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 12 22:08:06.563283 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 12 22:08:06.563288 kernel: x2apic enabled Feb 12 22:08:06.563293 kernel: Switched APIC routing to cluster x2apic. Feb 12 22:08:06.563298 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 22:08:06.563303 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 12 22:08:06.563309 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 12 22:08:06.563314 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 12 22:08:06.563319 kernel: process: using mwait in idle threads Feb 12 22:08:06.563324 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 22:08:06.563329 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 22:08:06.563334 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 22:08:06.563339 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 12 22:08:06.563344 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 12 22:08:06.563350 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 22:08:06.563355 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 12 22:08:06.563360 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 12 22:08:06.563366 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 22:08:06.563371 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 22:08:06.563376 kernel: TAA: Mitigation: TSX disabled Feb 12 22:08:06.563381 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 12 22:08:06.563386 kernel: SRBDS: Mitigation: Microcode Feb 12 22:08:06.563391 kernel: GDS: Vulnerable: No microcode Feb 12 22:08:06.563397 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 22:08:06.563402 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 22:08:06.563407 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 22:08:06.563412 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 12 22:08:06.563417 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 12 22:08:06.563422 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 22:08:06.563427 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 12 22:08:06.563432 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 12 22:08:06.563437 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 12 22:08:06.563442 kernel: Freeing SMP alternatives memory: 32K Feb 12 22:08:06.563447 kernel: pid_max: default: 32768 minimum: 301 Feb 12 22:08:06.563452 kernel: LSM: Security Framework initializing Feb 12 22:08:06.563457 kernel: SELinux: Initializing. Feb 12 22:08:06.563462 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 22:08:06.563467 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 22:08:06.563472 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 12 22:08:06.563479 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 12 22:08:06.563500 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 12 22:08:06.563506 kernel: ... version: 4 Feb 12 22:08:06.563511 kernel: ... bit width: 48 Feb 12 22:08:06.563531 kernel: ... generic registers: 4 Feb 12 22:08:06.563536 kernel: ... value mask: 0000ffffffffffff Feb 12 22:08:06.563541 kernel: ... max period: 00007fffffffffff Feb 12 22:08:06.563546 kernel: ... fixed-purpose events: 3 Feb 12 22:08:06.563551 kernel: ... event mask: 000000070000000f Feb 12 22:08:06.563556 kernel: signal: max sigframe size: 2032 Feb 12 22:08:06.563561 kernel: rcu: Hierarchical SRCU implementation. Feb 12 22:08:06.563567 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 12 22:08:06.563572 kernel: smp: Bringing up secondary CPUs ... Feb 12 22:08:06.563577 kernel: x86: Booting SMP configuration: Feb 12 22:08:06.563582 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 12 22:08:06.563588 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 22:08:06.563593 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 12 22:08:06.563598 kernel: smp: Brought up 1 node, 16 CPUs Feb 12 22:08:06.563603 kernel: smpboot: Max logical packages: 1 Feb 12 22:08:06.563608 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 12 22:08:06.563613 kernel: devtmpfs: initialized Feb 12 22:08:06.563618 kernel: x86/mm: Memory block size: 128MB Feb 12 22:08:06.563623 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6eb23000-0x6eb23fff] (4096 bytes) Feb 12 22:08:06.563629 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x79233000-0x79664fff] (4399104 bytes) Feb 12 22:08:06.563634 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 22:08:06.563639 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 12 22:08:06.563644 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 22:08:06.563649 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 22:08:06.563654 kernel: audit: initializing netlink subsys (disabled) Feb 12 22:08:06.563660 kernel: audit: type=2000 audit(1707775680.120:1): state=initialized audit_enabled=0 res=1 Feb 12 22:08:06.563664 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 22:08:06.563669 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 22:08:06.563674 kernel: cpuidle: using governor menu Feb 12 22:08:06.563679 kernel: ACPI: bus type PCI registered Feb 12 22:08:06.563684 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 22:08:06.563689 kernel: dca service started, version 1.12.1 Feb 12 22:08:06.563694 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 12 22:08:06.563700 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 12 22:08:06.563705 kernel: PCI: Using configuration type 1 for base access Feb 12 22:08:06.563710 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 12 22:08:06.563715 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 22:08:06.563720 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 22:08:06.563725 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 22:08:06.563730 kernel: ACPI: Added _OSI(Module Device) Feb 12 22:08:06.563735 kernel: ACPI: Added _OSI(Processor Device) Feb 12 22:08:06.563740 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 22:08:06.563746 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 22:08:06.563751 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 22:08:06.563756 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 22:08:06.563761 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 22:08:06.563766 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 12 22:08:06.563771 kernel: ACPI: Dynamic OEM Table Load: Feb 12 22:08:06.563776 kernel: ACPI: SSDT 0xFFFF8EC140215000 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 12 22:08:06.563781 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 12 22:08:06.563786 kernel: ACPI: Dynamic OEM Table Load: Feb 12 22:08:06.563791 kernel: ACPI: SSDT 0xFFFF8EC141CE8000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 12 22:08:06.563797 kernel: ACPI: Dynamic OEM Table Load: Feb 12 22:08:06.563802 kernel: ACPI: SSDT 0xFFFF8EC141C53800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 12 22:08:06.563807 kernel: ACPI: Dynamic OEM Table Load: Feb 12 22:08:06.563812 kernel: ACPI: SSDT 0xFFFF8EC141C55800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 12 22:08:06.563817 kernel: ACPI: Dynamic OEM Table Load: Feb 12 22:08:06.563822 kernel: ACPI: SSDT 0xFFFF8EC14014E000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 12 22:08:06.563826 kernel: ACPI: Dynamic OEM Table Load: Feb 12 22:08:06.563831 kernel: ACPI: SSDT 0xFFFF8EC141CEB000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 12 22:08:06.563836 kernel: ACPI: Interpreter enabled Feb 12 22:08:06.563842 kernel: ACPI: PM: (supports S0 S5) Feb 12 22:08:06.563847 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 22:08:06.563852 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 12 22:08:06.563857 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 12 22:08:06.563862 kernel: HEST: Table parsing has been initialized. Feb 12 22:08:06.563867 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 12 22:08:06.563872 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 22:08:06.563877 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 12 22:08:06.563882 kernel: ACPI: PM: Power Resource [USBC] Feb 12 22:08:06.563888 kernel: ACPI: PM: Power Resource [V0PR] Feb 12 22:08:06.563893 kernel: ACPI: PM: Power Resource [V1PR] Feb 12 22:08:06.563898 kernel: ACPI: PM: Power Resource [V2PR] Feb 12 22:08:06.563903 kernel: ACPI: PM: Power Resource [WRST] Feb 12 22:08:06.563908 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 12 22:08:06.563913 kernel: ACPI: PM: Power Resource [FN00] Feb 12 22:08:06.563918 kernel: ACPI: PM: Power Resource [FN01] Feb 12 22:08:06.563923 kernel: ACPI: PM: Power Resource [FN02] Feb 12 22:08:06.563928 kernel: ACPI: PM: Power Resource [FN03] Feb 12 22:08:06.563934 kernel: ACPI: PM: Power Resource [FN04] Feb 12 22:08:06.563939 kernel: ACPI: PM: Power Resource [PIN] Feb 12 22:08:06.563944 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 12 22:08:06.564007 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 22:08:06.564052 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 12 22:08:06.564092 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 12 22:08:06.564099 kernel: PCI host bridge to bus 0000:00 Feb 12 22:08:06.564144 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 22:08:06.564183 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 22:08:06.564219 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 22:08:06.564255 kernel: pci_bus 0000:00: root bus resource [mem 0x7f800000-0xdfffffff window] Feb 12 22:08:06.564289 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 12 22:08:06.564325 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 12 22:08:06.564373 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 12 22:08:06.564423 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 12 22:08:06.564465 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 12 22:08:06.564516 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 12 22:08:06.564558 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 12 22:08:06.564602 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 12 22:08:06.564644 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x94000000-0x94ffffff 64bit] Feb 12 22:08:06.564687 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 12 22:08:06.564728 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 12 22:08:06.564775 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 12 22:08:06.564817 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9651f000-0x9651ffff 64bit] Feb 12 22:08:06.564861 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 12 22:08:06.564902 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9651e000-0x9651efff 64bit] Feb 12 22:08:06.564946 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 12 22:08:06.564989 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x96500000-0x9650ffff 64bit] Feb 12 22:08:06.565030 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 12 22:08:06.565073 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 12 22:08:06.565114 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x96512000-0x96513fff 64bit] Feb 12 22:08:06.565154 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9651d000-0x9651dfff 64bit] Feb 12 22:08:06.565198 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 12 22:08:06.565240 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 12 22:08:06.565283 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 12 22:08:06.565324 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 12 22:08:06.565369 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 12 22:08:06.565411 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9651a000-0x9651afff 64bit] Feb 12 22:08:06.565457 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 12 22:08:06.565536 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 12 22:08:06.565580 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x96519000-0x96519fff 64bit] Feb 12 22:08:06.565621 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 12 22:08:06.565664 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 12 22:08:06.565704 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x96518000-0x96518fff 64bit] Feb 12 22:08:06.565745 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 12 22:08:06.565788 kernel: pci 0000:00:17.0: [8086:2826] type 00 class 0x010400 Feb 12 22:08:06.565832 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x96510000-0x96511fff] Feb 12 22:08:06.565872 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x96517000-0x965170ff] Feb 12 22:08:06.565912 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 12 22:08:06.565952 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 12 22:08:06.565992 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 12 22:08:06.566033 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x96516000-0x965167ff] Feb 12 22:08:06.566073 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 12 22:08:06.566122 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 12 22:08:06.566164 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 12 22:08:06.566209 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 12 22:08:06.566252 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 12 22:08:06.566299 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 12 22:08:06.566341 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 12 22:08:06.566385 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 12 22:08:06.566427 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 12 22:08:06.566471 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 12 22:08:06.566545 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 12 22:08:06.566592 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 12 22:08:06.566633 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 12 22:08:06.566677 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 12 22:08:06.566722 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 12 22:08:06.566763 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x96514000-0x965140ff 64bit] Feb 12 22:08:06.566803 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 12 22:08:06.566849 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 12 22:08:06.566889 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 12 22:08:06.566932 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 12 22:08:06.566979 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 12 22:08:06.567023 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 12 22:08:06.567065 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x96200000-0x962fffff pref] Feb 12 22:08:06.567107 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 12 22:08:06.567151 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 12 22:08:06.567192 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 12 22:08:06.567238 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 12 22:08:06.567281 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 12 22:08:06.567325 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x96100000-0x961fffff pref] Feb 12 22:08:06.567367 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 12 22:08:06.567409 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 12 22:08:06.567453 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 12 22:08:06.567516 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 12 22:08:06.567577 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 12 22:08:06.567618 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 12 22:08:06.567658 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 12 22:08:06.567704 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 12 22:08:06.567747 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x96400000-0x9647ffff] Feb 12 22:08:06.567791 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 12 22:08:06.567833 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x96480000-0x96483fff] Feb 12 22:08:06.567875 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 12 22:08:06.567917 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 12 22:08:06.567957 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 12 22:08:06.567998 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 12 22:08:06.568044 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 12 22:08:06.568087 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x96300000-0x9637ffff] Feb 12 22:08:06.568130 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 12 22:08:06.568175 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x96380000-0x96383fff] Feb 12 22:08:06.568266 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 12 22:08:06.568306 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 12 22:08:06.568348 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 12 22:08:06.568389 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 12 22:08:06.568430 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 12 22:08:06.568477 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 12 22:08:06.568555 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 12 22:08:06.568597 kernel: pci 0000:07:00.0: supports D1 D2 Feb 12 22:08:06.568638 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 12 22:08:06.568679 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 12 22:08:06.568720 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 12 22:08:06.568761 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 12 22:08:06.568805 kernel: pci_bus 0000:08: extended config space not accessible Feb 12 22:08:06.568857 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 12 22:08:06.568903 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x95000000-0x95ffffff] Feb 12 22:08:06.568948 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x96000000-0x9601ffff] Feb 12 22:08:06.568992 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 12 22:08:06.569036 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 22:08:06.569080 kernel: pci 0000:08:00.0: supports D1 D2 Feb 12 22:08:06.569125 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 12 22:08:06.569169 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 12 22:08:06.569212 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 12 22:08:06.569255 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 12 22:08:06.569262 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 12 22:08:06.569268 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 12 22:08:06.569273 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 12 22:08:06.569279 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 12 22:08:06.569284 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 12 22:08:06.569291 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 12 22:08:06.569296 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 12 22:08:06.569301 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 12 22:08:06.569307 kernel: iommu: Default domain type: Translated Feb 12 22:08:06.569312 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 22:08:06.569356 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 12 22:08:06.569400 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 22:08:06.569445 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 12 22:08:06.569452 kernel: vgaarb: loaded Feb 12 22:08:06.569459 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 22:08:06.569465 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 22:08:06.569470 kernel: PTP clock support registered Feb 12 22:08:06.569478 kernel: PCI: Using ACPI for IRQ routing Feb 12 22:08:06.569483 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 22:08:06.569505 kernel: e820: reserve RAM buffer [mem 0x0008f800-0x0008ffff] Feb 12 22:08:06.569511 kernel: e820: reserve RAM buffer [mem 0x6eb23000-0x6fffffff] Feb 12 22:08:06.569516 kernel: e820: reserve RAM buffer [mem 0x77fc7000-0x77ffffff] Feb 12 22:08:06.569521 kernel: e820: reserve RAM buffer [mem 0x79233000-0x7bffffff] Feb 12 22:08:06.569527 kernel: e820: reserve RAM buffer [mem 0x7bf00000-0x7bffffff] Feb 12 22:08:06.569533 kernel: e820: reserve RAM buffer [mem 0x87f800000-0x87fffffff] Feb 12 22:08:06.569538 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 12 22:08:06.569543 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 12 22:08:06.569549 kernel: clocksource: Switched to clocksource tsc-early Feb 12 22:08:06.569554 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 22:08:06.569560 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 22:08:06.569565 kernel: pnp: PnP ACPI init Feb 12 22:08:06.569609 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 12 22:08:06.569653 kernel: pnp 00:02: [dma 0 disabled] Feb 12 22:08:06.569695 kernel: pnp 00:03: [dma 0 disabled] Feb 12 22:08:06.569736 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 12 22:08:06.569773 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 12 22:08:06.569815 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 12 22:08:06.569856 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 12 22:08:06.569896 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 12 22:08:06.569933 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 12 22:08:06.569970 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 12 22:08:06.570008 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 12 22:08:06.570044 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 12 22:08:06.570084 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 12 22:08:06.570120 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 12 22:08:06.570162 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 12 22:08:06.570200 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 12 22:08:06.570238 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 12 22:08:06.570275 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 12 22:08:06.570312 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 12 22:08:06.570349 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 12 22:08:06.570386 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 12 22:08:06.570427 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 12 22:08:06.570435 kernel: pnp: PnP ACPI: found 10 devices Feb 12 22:08:06.570441 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 22:08:06.570447 kernel: NET: Registered PF_INET protocol family Feb 12 22:08:06.570452 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 22:08:06.570458 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 22:08:06.570463 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 22:08:06.570469 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 22:08:06.570478 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 12 22:08:06.570483 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 12 22:08:06.570489 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 12 22:08:06.570494 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 12 22:08:06.570500 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 22:08:06.570505 kernel: NET: Registered PF_XDP protocol family Feb 12 22:08:06.570549 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7f800000-0x7f800fff 64bit] Feb 12 22:08:06.570590 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7f801000-0x7f801fff 64bit] Feb 12 22:08:06.570635 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7f802000-0x7f802fff 64bit] Feb 12 22:08:06.570677 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 12 22:08:06.570723 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 12 22:08:06.570766 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 12 22:08:06.570811 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 12 22:08:06.570856 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 12 22:08:06.570899 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 12 22:08:06.570941 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 12 22:08:06.570983 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 12 22:08:06.571025 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 12 22:08:06.571066 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 12 22:08:06.571110 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 12 22:08:06.571151 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 12 22:08:06.571196 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 12 22:08:06.571238 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 12 22:08:06.571279 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 12 22:08:06.571321 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 12 22:08:06.571363 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 12 22:08:06.571407 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 12 22:08:06.571450 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 12 22:08:06.571495 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 12 22:08:06.571537 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 12 22:08:06.571582 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 12 22:08:06.571620 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 12 22:08:06.571657 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 22:08:06.571694 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 22:08:06.571730 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 22:08:06.571767 kernel: pci_bus 0000:00: resource 7 [mem 0x7f800000-0xdfffffff window] Feb 12 22:08:06.571803 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 12 22:08:06.571846 kernel: pci_bus 0000:02: resource 1 [mem 0x96100000-0x962fffff] Feb 12 22:08:06.571887 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 12 22:08:06.571929 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 12 22:08:06.571969 kernel: pci_bus 0000:04: resource 1 [mem 0x96400000-0x964fffff] Feb 12 22:08:06.572013 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 12 22:08:06.572051 kernel: pci_bus 0000:05: resource 1 [mem 0x96300000-0x963fffff] Feb 12 22:08:06.572094 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 12 22:08:06.572135 kernel: pci_bus 0000:07: resource 1 [mem 0x95000000-0x960fffff] Feb 12 22:08:06.572175 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 12 22:08:06.572216 kernel: pci_bus 0000:08: resource 1 [mem 0x95000000-0x960fffff] Feb 12 22:08:06.572223 kernel: PCI: CLS 64 bytes, default 64 Feb 12 22:08:06.572229 kernel: DMAR: No ATSR found Feb 12 22:08:06.572235 kernel: DMAR: No SATC found Feb 12 22:08:06.572240 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 12 22:08:06.572246 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 12 22:08:06.572252 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 12 22:08:06.572258 kernel: DMAR: IOMMU feature pasid inconsistent Feb 12 22:08:06.572264 kernel: DMAR: IOMMU feature eafs inconsistent Feb 12 22:08:06.572269 kernel: DMAR: IOMMU feature prs inconsistent Feb 12 22:08:06.572275 kernel: DMAR: IOMMU feature nest inconsistent Feb 12 22:08:06.572280 kernel: DMAR: IOMMU feature mts inconsistent Feb 12 22:08:06.572285 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 12 22:08:06.572291 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 12 22:08:06.572297 kernel: DMAR: dmar0: Using Queued invalidation Feb 12 22:08:06.572303 kernel: DMAR: dmar1: Using Queued invalidation Feb 12 22:08:06.572345 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 12 22:08:06.572388 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 12 22:08:06.572431 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 12 22:08:06.572472 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 12 22:08:06.572516 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 12 22:08:06.572558 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 12 22:08:06.572600 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 12 22:08:06.572644 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 12 22:08:06.572685 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 12 22:08:06.572726 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 12 22:08:06.572767 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 12 22:08:06.572808 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 12 22:08:06.572849 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 12 22:08:06.572890 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 12 22:08:06.572932 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 12 22:08:06.572975 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 12 22:08:06.573017 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 12 22:08:06.573058 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 12 22:08:06.573101 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 12 22:08:06.573142 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 12 22:08:06.573185 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 12 22:08:06.573225 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 12 22:08:06.573267 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 12 22:08:06.573310 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 12 22:08:06.573355 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 12 22:08:06.573399 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 12 22:08:06.573442 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 12 22:08:06.573489 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 12 22:08:06.573535 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 12 22:08:06.573543 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 12 22:08:06.573549 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 12 22:08:06.573556 kernel: software IO TLB: mapped [mem 0x0000000073fc7000-0x0000000077fc7000] (64MB) Feb 12 22:08:06.573561 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 12 22:08:06.573567 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 12 22:08:06.573572 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 12 22:08:06.573578 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 12 22:08:06.573583 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 12 22:08:06.573628 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 12 22:08:06.573636 kernel: Initialise system trusted keyrings Feb 12 22:08:06.573643 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 12 22:08:06.573649 kernel: Key type asymmetric registered Feb 12 22:08:06.573654 kernel: Asymmetric key parser 'x509' registered Feb 12 22:08:06.573660 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 22:08:06.573665 kernel: io scheduler mq-deadline registered Feb 12 22:08:06.573671 kernel: io scheduler kyber registered Feb 12 22:08:06.573676 kernel: io scheduler bfq registered Feb 12 22:08:06.573736 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 12 22:08:06.573778 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 12 22:08:06.573822 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 12 22:08:06.573864 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 12 22:08:06.573905 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 12 22:08:06.573945 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 12 22:08:06.573987 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 12 22:08:06.574032 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 12 22:08:06.574040 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 12 22:08:06.574047 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 12 22:08:06.574052 kernel: pstore: Registered erst as persistent store backend Feb 12 22:08:06.574058 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 22:08:06.574063 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 22:08:06.574069 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 22:08:06.574074 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 12 22:08:06.574116 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 12 22:08:06.574124 kernel: i8042: PNP: No PS/2 controller found. Feb 12 22:08:06.574162 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 12 22:08:06.574200 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 12 22:08:06.574237 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-12T22:08:05 UTC (1707775685) Feb 12 22:08:06.574275 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 12 22:08:06.574282 kernel: fail to initialize ptp_kvm Feb 12 22:08:06.574288 kernel: intel_pstate: Intel P-state driver initializing Feb 12 22:08:06.574293 kernel: intel_pstate: Disabling energy efficiency optimization Feb 12 22:08:06.574299 kernel: intel_pstate: HWP enabled Feb 12 22:08:06.574306 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 12 22:08:06.574311 kernel: vesafb: scrolling: redraw Feb 12 22:08:06.574316 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 12 22:08:06.574322 kernel: vesafb: framebuffer at 0x95000000, mapped to 0x000000005162434a, using 768k, total 768k Feb 12 22:08:06.574327 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 22:08:06.574333 kernel: fb0: VESA VGA frame buffer device Feb 12 22:08:06.574338 kernel: NET: Registered PF_INET6 protocol family Feb 12 22:08:06.574344 kernel: Segment Routing with IPv6 Feb 12 22:08:06.574349 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 22:08:06.574354 kernel: NET: Registered PF_PACKET protocol family Feb 12 22:08:06.574360 kernel: Key type dns_resolver registered Feb 12 22:08:06.574366 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 12 22:08:06.574371 kernel: microcode: Microcode Update Driver: v2.2. Feb 12 22:08:06.574377 kernel: IPI shorthand broadcast: enabled Feb 12 22:08:06.574382 kernel: sched_clock: Marking stable (2325842855, 1360182872)->(4633144929, -947119202) Feb 12 22:08:06.574387 kernel: registered taskstats version 1 Feb 12 22:08:06.574393 kernel: Loading compiled-in X.509 certificates Feb 12 22:08:06.574398 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 22:08:06.574403 kernel: Key type .fscrypt registered Feb 12 22:08:06.574410 kernel: Key type fscrypt-provisioning registered Feb 12 22:08:06.574415 kernel: pstore: Using crash dump compression: deflate Feb 12 22:08:06.574420 kernel: ima: Allocated hash algorithm: sha1 Feb 12 22:08:06.574426 kernel: ima: No architecture policies found Feb 12 22:08:06.574431 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 22:08:06.574437 kernel: Write protecting the kernel read-only data: 28672k Feb 12 22:08:06.574442 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 22:08:06.574447 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 22:08:06.574454 kernel: Run /init as init process Feb 12 22:08:06.574459 kernel: with arguments: Feb 12 22:08:06.574465 kernel: /init Feb 12 22:08:06.574470 kernel: with environment: Feb 12 22:08:06.574477 kernel: HOME=/ Feb 12 22:08:06.574482 kernel: TERM=linux Feb 12 22:08:06.574505 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 22:08:06.574512 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:08:06.574539 systemd[1]: Detected architecture x86-64. Feb 12 22:08:06.574545 systemd[1]: Running in initrd. Feb 12 22:08:06.574550 systemd[1]: No hostname configured, using default hostname. Feb 12 22:08:06.574556 systemd[1]: Hostname set to . Feb 12 22:08:06.574561 systemd[1]: Initializing machine ID from random generator. Feb 12 22:08:06.574566 systemd[1]: Queued start job for default target initrd.target. Feb 12 22:08:06.574572 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:08:06.574577 systemd[1]: Reached target cryptsetup.target. Feb 12 22:08:06.574583 systemd[1]: Reached target paths.target. Feb 12 22:08:06.574588 systemd[1]: Reached target slices.target. Feb 12 22:08:06.574593 systemd[1]: Reached target swap.target. Feb 12 22:08:06.574599 systemd[1]: Reached target timers.target. Feb 12 22:08:06.574604 systemd[1]: Listening on iscsid.socket. Feb 12 22:08:06.574609 systemd[1]: Listening on iscsiuio.socket. Feb 12 22:08:06.574615 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 22:08:06.574620 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 22:08:06.574626 systemd[1]: Listening on systemd-journald.socket. Feb 12 22:08:06.574632 kernel: tsc: Refined TSC clocksource calibration: 3407.991 MHz Feb 12 22:08:06.574637 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fcb8dbdf, max_idle_ns: 440795301826 ns Feb 12 22:08:06.574643 kernel: clocksource: Switched to clocksource tsc Feb 12 22:08:06.574648 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:08:06.574654 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:08:06.574659 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:08:06.574664 systemd[1]: Reached target sockets.target. Feb 12 22:08:06.574670 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:08:06.574676 systemd[1]: Finished network-cleanup.service. Feb 12 22:08:06.574681 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 22:08:06.574687 systemd[1]: Starting systemd-journald.service... Feb 12 22:08:06.574692 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:08:06.574700 systemd-journald[268]: Journal started Feb 12 22:08:06.574725 systemd-journald[268]: Runtime Journal (/run/log/journal/bb27c73088954c4c83e565cf82bbf9c9) is 8.0M, max 639.3M, 631.3M free. Feb 12 22:08:06.576841 systemd-modules-load[269]: Inserted module 'overlay' Feb 12 22:08:06.582000 audit: BPF prog-id=6 op=LOAD Feb 12 22:08:06.601525 kernel: audit: type=1334 audit(1707775686.582:2): prog-id=6 op=LOAD Feb 12 22:08:06.601556 systemd[1]: Starting systemd-resolved.service... Feb 12 22:08:06.649489 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 22:08:06.649525 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 22:08:06.680521 kernel: Bridge firewalling registered Feb 12 22:08:06.680550 systemd[1]: Started systemd-journald.service. Feb 12 22:08:06.694590 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 12 22:08:06.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.700544 systemd-resolved[271]: Positive Trust Anchors: Feb 12 22:08:06.800260 kernel: audit: type=1130 audit(1707775686.701:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.800271 kernel: SCSI subsystem initialized Feb 12 22:08:06.800278 kernel: audit: type=1130 audit(1707775686.754:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.700551 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:08:06.921572 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 22:08:06.921584 kernel: audit: type=1130 audit(1707775686.825:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.921592 kernel: device-mapper: uevent: version 1.0.3 Feb 12 22:08:06.921599 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 22:08:06.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.700571 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:08:06.994731 kernel: audit: type=1130 audit(1707775686.928:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.702117 systemd-resolved[271]: Defaulting to hostname 'linux'. Feb 12 22:08:07.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.702699 systemd[1]: Started systemd-resolved.service. Feb 12 22:08:07.105643 kernel: audit: type=1130 audit(1707775687.002:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:07.105654 kernel: audit: type=1130 audit(1707775687.058:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:07.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.755644 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:08:06.826638 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 22:08:06.922633 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 12 22:08:06.929796 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:08:07.003857 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 22:08:07.059782 systemd[1]: Reached target nss-lookup.target. Feb 12 22:08:07.115085 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 22:08:07.136038 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:08:07.136331 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:08:07.139063 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:08:07.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:07.188477 kernel: audit: type=1130 audit(1707775687.137:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:07.139828 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:08:07.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:07.202823 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 22:08:07.267565 kernel: audit: type=1130 audit(1707775687.201:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:07.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:07.259107 systemd[1]: Starting dracut-cmdline.service... Feb 12 22:08:07.281576 dracut-cmdline[294]: dracut-dracut-053 Feb 12 22:08:07.281576 dracut-cmdline[294]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 12 22:08:07.281576 dracut-cmdline[294]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:08:07.349563 kernel: Loading iSCSI transport class v2.0-870. Feb 12 22:08:07.349576 kernel: iscsi: registered transport (tcp) Feb 12 22:08:07.400891 kernel: iscsi: registered transport (qla4xxx) Feb 12 22:08:07.400908 kernel: QLogic iSCSI HBA Driver Feb 12 22:08:07.417898 systemd[1]: Finished dracut-cmdline.service. Feb 12 22:08:07.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:07.427226 systemd[1]: Starting dracut-pre-udev.service... Feb 12 22:08:07.485507 kernel: raid6: avx2x4 gen() 47510 MB/s Feb 12 22:08:07.521508 kernel: raid6: avx2x4 xor() 21431 MB/s Feb 12 22:08:07.556508 kernel: raid6: avx2x2 gen() 53802 MB/s Feb 12 22:08:07.591545 kernel: raid6: avx2x2 xor() 32113 MB/s Feb 12 22:08:07.626547 kernel: raid6: avx2x1 gen() 45216 MB/s Feb 12 22:08:07.660541 kernel: raid6: avx2x1 xor() 27885 MB/s Feb 12 22:08:07.694546 kernel: raid6: sse2x4 gen() 21354 MB/s Feb 12 22:08:07.728542 kernel: raid6: sse2x4 xor() 11969 MB/s Feb 12 22:08:07.762542 kernel: raid6: sse2x2 gen() 21659 MB/s Feb 12 22:08:07.796508 kernel: raid6: sse2x2 xor() 13426 MB/s Feb 12 22:08:07.830510 kernel: raid6: sse2x1 gen() 18285 MB/s Feb 12 22:08:07.882501 kernel: raid6: sse2x1 xor() 8927 MB/s Feb 12 22:08:07.882516 kernel: raid6: using algorithm avx2x2 gen() 53802 MB/s Feb 12 22:08:07.882524 kernel: raid6: .... xor() 32113 MB/s, rmw enabled Feb 12 22:08:07.900784 kernel: raid6: using avx2x2 recovery algorithm Feb 12 22:08:07.947515 kernel: xor: automatically using best checksumming function avx Feb 12 22:08:08.026509 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 22:08:08.031481 systemd[1]: Finished dracut-pre-udev.service. Feb 12 22:08:08.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:08.044000 audit: BPF prog-id=7 op=LOAD Feb 12 22:08:08.044000 audit: BPF prog-id=8 op=LOAD Feb 12 22:08:08.046551 systemd[1]: Starting systemd-udevd.service... Feb 12 22:08:08.054525 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 12 22:08:08.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:08.057011 systemd[1]: Started systemd-udevd.service. Feb 12 22:08:08.069211 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 22:08:08.100755 dracut-pre-trigger[486]: rd.md=0: removing MD RAID activation Feb 12 22:08:08.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:08.098032 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 22:08:08.109665 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:08:08.159181 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:08:08.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:08.188487 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 22:08:08.224525 kernel: ACPI: bus type USB registered Feb 12 22:08:08.224565 kernel: usbcore: registered new interface driver usbfs Feb 12 22:08:08.224575 kernel: usbcore: registered new interface driver hub Feb 12 22:08:08.260480 kernel: usbcore: registered new device driver usb Feb 12 22:08:08.260504 kernel: libata version 3.00 loaded. Feb 12 22:08:08.283484 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 22:08:08.283524 kernel: AES CTR mode by8 optimization enabled Feb 12 22:08:08.301483 kernel: ahci 0000:00:17.0: version 3.0 Feb 12 22:08:08.301608 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 12 22:08:08.338504 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl RAID mode Feb 12 22:08:08.338586 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 12 22:08:08.338595 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 12 22:08:08.376479 kernel: scsi host0: ahci Feb 12 22:08:08.403957 kernel: scsi host1: ahci Feb 12 22:08:08.404049 kernel: mlx5_core 0000:02:00.0: firmware version: 14.31.1014 Feb 12 22:08:08.404119 kernel: scsi host2: ahci Feb 12 22:08:08.409481 kernel: pps pps0: new PPS source ptp0 Feb 12 22:08:08.409564 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 12 22:08:08.409634 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 12 22:08:08.409698 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:0f:36 Feb 12 22:08:08.409758 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 12 22:08:08.409816 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 12 22:08:08.433617 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 12 22:08:08.443477 kernel: scsi host3: ahci Feb 12 22:08:08.443500 kernel: pps pps1: new PPS source ptp1 Feb 12 22:08:08.443567 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 12 22:08:08.443632 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 12 22:08:08.443692 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:0f:37 Feb 12 22:08:08.443749 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 12 22:08:08.443807 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 12 22:08:08.448482 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 12 22:08:08.478433 kernel: scsi host4: ahci Feb 12 22:08:08.656479 kernel: scsi host5: ahci Feb 12 22:08:08.676118 kernel: scsi host6: ahci Feb 12 22:08:08.676208 kernel: scsi host7: ahci Feb 12 22:08:08.686270 kernel: ata1: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516100 irq 129 Feb 12 22:08:08.701278 kernel: ata2: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516180 irq 129 Feb 12 22:08:08.716274 kernel: ata3: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516200 irq 129 Feb 12 22:08:08.731237 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 12 22:08:08.731314 kernel: ata4: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516280 irq 129 Feb 12 22:08:08.776156 kernel: port_module: 8 callbacks suppressed Feb 12 22:08:08.776172 kernel: mlx5_core 0000:02:00.0: Port module event: module 0, Cable plugged Feb 12 22:08:08.776237 kernel: ata5: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516300 irq 129 Feb 12 22:08:08.807907 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 12 22:08:08.807983 kernel: ata6: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516380 irq 129 Feb 12 22:08:08.857736 kernel: ata7: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516400 irq 129 Feb 12 22:08:08.857753 kernel: ata8: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516480 irq 129 Feb 12 22:08:09.122567 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 12 22:08:09.169426 kernel: mlx5_core 0000:02:00.1: firmware version: 14.31.1014 Feb 12 22:08:09.169527 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 12 22:08:09.193512 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 12 22:08:09.193527 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 12 22:08:09.208511 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 12 22:08:09.223540 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 12 22:08:09.237534 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 12 22:08:09.251550 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 12 22:08:09.268529 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 12 22:08:09.282523 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 12 22:08:09.297510 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 12 22:08:09.311532 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 12 22:08:09.356500 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 12 22:08:09.356515 kernel: ata2.00: Features: NCQ-prio Feb 12 22:08:09.387142 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 12 22:08:09.387160 kernel: ata1.00: Features: NCQ-prio Feb 12 22:08:09.403534 kernel: ata2.00: configured for UDMA/133 Feb 12 22:08:09.418538 kernel: ata1.00: configured for UDMA/133 Feb 12 22:08:09.418553 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 12 22:08:09.435531 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 12 22:08:09.470487 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 12 22:08:09.470588 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 12 22:08:09.470645 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 12 22:08:09.470699 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 12 22:08:09.502478 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 12 22:08:09.517875 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 12 22:08:09.567300 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 12 22:08:09.567410 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 12 22:08:09.600582 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 12 22:08:09.613973 kernel: hub 1-0:1.0: USB hub found Feb 12 22:08:09.614105 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 12 22:08:09.614165 kernel: hub 1-0:1.0: 16 ports detected Feb 12 22:08:09.672841 kernel: hub 2-0:1.0: USB hub found Feb 12 22:08:09.672952 kernel: hub 2-0:1.0: 10 ports detected Feb 12 22:08:09.687986 kernel: usb: port power management may be unreliable Feb 12 22:08:09.688479 kernel: ata1.00: Enabling discard_zeroes_data Feb 12 22:08:09.702822 kernel: ata2.00: Enabling discard_zeroes_data Feb 12 22:08:09.717219 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 12 22:08:09.717304 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 12 22:08:09.734518 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Feb 12 22:08:09.734595 kernel: sd 0:0:0:0: [sdb] Write Protect is off Feb 12 22:08:09.765909 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Feb 12 22:08:09.765986 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 12 22:08:09.766045 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 12 22:08:09.779857 kernel: sd 1:0:0:0: [sda] Write Protect is off Feb 12 22:08:09.825922 kernel: ata1.00: Enabling discard_zeroes_data Feb 12 22:08:09.825937 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 12 22:08:09.856329 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 22:08:09.856344 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 12 22:08:09.856412 kernel: GPT:9289727 != 937703087 Feb 12 22:08:09.856420 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 22:08:09.856426 kernel: GPT:9289727 != 937703087 Feb 12 22:08:09.856432 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 22:08:09.856440 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 12 22:08:09.887514 kernel: ata2.00: Enabling discard_zeroes_data Feb 12 22:08:09.902991 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 12 22:08:09.903032 kernel: ata1.00: Enabling discard_zeroes_data Feb 12 22:08:09.988053 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Feb 12 22:08:09.988177 kernel: ata2.00: Enabling discard_zeroes_data Feb 12 22:08:10.015963 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Feb 12 22:08:10.058931 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 22:08:10.105647 kernel: hub 1-14:1.0: USB hub found Feb 12 22:08:10.105729 kernel: hub 1-14:1.0: 4 ports detected Feb 12 22:08:10.105786 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (532) Feb 12 22:08:10.102072 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 22:08:10.116550 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 22:08:10.147149 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 22:08:10.191699 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 12 22:08:10.191777 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Feb 12 22:08:10.185507 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:08:10.238614 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth1 Feb 12 22:08:10.238684 kernel: ata1.00: Enabling discard_zeroes_data Feb 12 22:08:10.238693 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 12 22:08:10.207031 systemd[1]: Starting disk-uuid.service... Feb 12 22:08:10.270619 kernel: ata1.00: Enabling discard_zeroes_data Feb 12 22:08:10.270629 kernel: GPT:disk_guids don't match. Feb 12 22:08:10.270679 disk-uuid[692]: Primary Header is updated. Feb 12 22:08:10.270679 disk-uuid[692]: Secondary Entries is updated. Feb 12 22:08:10.270679 disk-uuid[692]: Secondary Header is updated. Feb 12 22:08:10.341514 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 22:08:10.341530 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 12 22:08:10.341537 kernel: ata1.00: Enabling discard_zeroes_data Feb 12 22:08:10.341544 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 12 22:08:10.368487 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 12 22:08:10.492548 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 22:08:10.523700 kernel: usbcore: registered new interface driver usbhid Feb 12 22:08:10.523716 kernel: usbhid: USB HID core driver Feb 12 22:08:10.555518 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 12 22:08:10.679914 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 12 22:08:10.680050 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 12 22:08:10.680059 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 12 22:08:11.292346 kernel: ata1.00: Enabling discard_zeroes_data Feb 12 22:08:11.311541 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 12 22:08:11.311668 disk-uuid[693]: The operation has completed successfully. Feb 12 22:08:11.349582 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 22:08:11.444294 kernel: audit: type=1130 audit(1707775691.355:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.444311 kernel: audit: type=1131 audit(1707775691.355:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.349627 systemd[1]: Finished disk-uuid.service. Feb 12 22:08:11.473577 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 22:08:11.364827 systemd[1]: Starting verity-setup.service... Feb 12 22:08:11.504675 systemd[1]: Found device dev-mapper-usr.device. Feb 12 22:08:11.513488 systemd[1]: Mounting sysusr-usr.mount... Feb 12 22:08:11.531652 systemd[1]: Finished verity-setup.service. Feb 12 22:08:11.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.578506 kernel: audit: type=1130 audit(1707775691.530:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.633480 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 22:08:11.633733 systemd[1]: Mounted sysusr-usr.mount. Feb 12 22:08:11.640766 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 22:08:11.641172 systemd[1]: Starting ignition-setup.service... Feb 12 22:08:11.729725 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:08:11.729741 kernel: BTRFS info (device sdb6): using free space tree Feb 12 22:08:11.729748 kernel: BTRFS info (device sdb6): has skinny extents Feb 12 22:08:11.729755 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 12 22:08:11.671979 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 22:08:11.737999 systemd[1]: Finished ignition-setup.service. Feb 12 22:08:11.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.756900 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 22:08:11.862122 kernel: audit: type=1130 audit(1707775691.755:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.862141 kernel: audit: type=1130 audit(1707775691.812:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.814144 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 22:08:11.893961 kernel: audit: type=1334 audit(1707775691.870:24): prog-id=9 op=LOAD Feb 12 22:08:11.870000 audit: BPF prog-id=9 op=LOAD Feb 12 22:08:11.872388 systemd[1]: Starting systemd-networkd.service... Feb 12 22:08:11.907886 systemd-networkd[880]: lo: Link UP Feb 12 22:08:11.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.939053 ignition[870]: Ignition 2.14.0 Feb 12 22:08:11.981618 kernel: audit: type=1130 audit(1707775691.917:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.907888 systemd-networkd[880]: lo: Gained carrier Feb 12 22:08:11.939057 ignition[870]: Stage: fetch-offline Feb 12 22:08:11.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.908171 systemd-networkd[880]: Enumeration completed Feb 12 22:08:12.062527 kernel: audit: type=1130 audit(1707775691.994:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:12.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.939084 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:08:11.908248 systemd[1]: Started systemd-networkd.service. Feb 12 22:08:11.939098 ignition[870]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 12 22:08:11.908860 systemd-networkd[880]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:08:12.150708 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 12 22:08:12.150867 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Feb 12 22:08:12.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.947154 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 12 22:08:12.167546 iscsid[906]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:08:12.167546 iscsid[906]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 22:08:12.167546 iscsid[906]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 22:08:12.167546 iscsid[906]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 22:08:12.167546 iscsid[906]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 22:08:12.167546 iscsid[906]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:08:12.167546 iscsid[906]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 22:08:12.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.918610 systemd[1]: Reached target network.target. Feb 12 22:08:12.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.947221 ignition[870]: parsed url from cmdline: "" Feb 12 22:08:11.968893 unknown[870]: fetched base config from "system" Feb 12 22:08:11.947223 ignition[870]: no config URL provided Feb 12 22:08:11.968898 unknown[870]: fetched user config from "system" Feb 12 22:08:11.947226 ignition[870]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 22:08:11.976979 systemd[1]: Starting iscsiuio.service... Feb 12 22:08:11.947257 ignition[870]: parsing config with SHA512: 076d136a32aa8cbc9d99878f757be542e77823311b27c42e80ef009d119b2deda0db5f9484d7d4e708b795c9ad8205c0fc91f85173a6f7cacf9ea72a977f475d Feb 12 22:08:11.988782 systemd[1]: Started iscsiuio.service. Feb 12 22:08:12.395602 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 12 22:08:11.969248 ignition[870]: fetch-offline: fetch-offline passed Feb 12 22:08:11.995829 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 22:08:11.969251 ignition[870]: POST message to Packet Timeline Feb 12 22:08:12.055728 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 22:08:11.969255 ignition[870]: POST Status error: resource requires networking Feb 12 22:08:12.056184 systemd[1]: Starting ignition-kargs.service... Feb 12 22:08:11.969284 ignition[870]: Ignition finished successfully Feb 12 22:08:12.070137 systemd[1]: Starting iscsid.service... Feb 12 22:08:12.060841 ignition[897]: Ignition 2.14.0 Feb 12 22:08:12.086570 systemd[1]: Started iscsid.service. Feb 12 22:08:12.060845 ignition[897]: Stage: kargs Feb 12 22:08:12.115340 systemd-networkd[880]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:08:12.060899 ignition[897]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:08:12.128153 systemd[1]: Starting dracut-initqueue.service... Feb 12 22:08:12.060909 ignition[897]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 12 22:08:12.157771 systemd[1]: Finished dracut-initqueue.service. Feb 12 22:08:12.062213 ignition[897]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 12 22:08:12.175589 systemd[1]: Reached target remote-fs-pre.target. Feb 12 22:08:12.063691 ignition[897]: kargs: kargs passed Feb 12 22:08:12.239682 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:08:12.063694 ignition[897]: POST message to Packet Timeline Feb 12 22:08:12.255658 systemd[1]: Reached target remote-fs.target. Feb 12 22:08:12.063705 ignition[897]: GET https://metadata.packet.net/metadata: attempt #1 Feb 12 22:08:12.267360 systemd[1]: Starting dracut-pre-mount.service... Feb 12 22:08:12.065249 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43323->[::1]:53: read: connection refused Feb 12 22:08:12.286008 systemd[1]: Finished dracut-pre-mount.service. Feb 12 22:08:12.265861 ignition[897]: GET https://metadata.packet.net/metadata: attempt #2 Feb 12 22:08:12.390788 systemd-networkd[880]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:08:12.266380 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60717->[::1]:53: read: connection refused Feb 12 22:08:12.418953 systemd-networkd[880]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:08:12.447075 systemd-networkd[880]: enp2s0f1np1: Link UP Feb 12 22:08:12.447284 systemd-networkd[880]: enp2s0f1np1: Gained carrier Feb 12 22:08:12.667232 ignition[897]: GET https://metadata.packet.net/metadata: attempt #3 Feb 12 22:08:12.458861 systemd-networkd[880]: enp2s0f0np0: Link UP Feb 12 22:08:12.668535 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:35017->[::1]:53: read: connection refused Feb 12 22:08:12.459144 systemd-networkd[880]: eno2: Link UP Feb 12 22:08:12.459401 systemd-networkd[880]: eno1: Link UP Feb 12 22:08:13.179278 systemd-networkd[880]: enp2s0f0np0: Gained carrier Feb 12 22:08:13.188578 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Feb 12 22:08:13.222662 systemd-networkd[880]: enp2s0f0np0: DHCPv4 address 147.75.49.97/31, gateway 147.75.49.96 acquired from 145.40.83.140 Feb 12 22:08:13.412958 systemd-networkd[880]: enp2s0f1np1: Gained IPv6LL Feb 12 22:08:13.468942 ignition[897]: GET https://metadata.packet.net/metadata: attempt #4 Feb 12 22:08:13.470364 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60669->[::1]:53: read: connection refused Feb 12 22:08:14.948945 systemd-networkd[880]: enp2s0f0np0: Gained IPv6LL Feb 12 22:08:15.071635 ignition[897]: GET https://metadata.packet.net/metadata: attempt #5 Feb 12 22:08:15.073072 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50647->[::1]:53: read: connection refused Feb 12 22:08:18.276432 ignition[897]: GET https://metadata.packet.net/metadata: attempt #6 Feb 12 22:08:18.314483 ignition[897]: GET result: OK Feb 12 22:08:18.507010 ignition[897]: Ignition finished successfully Feb 12 22:08:18.509896 systemd[1]: Finished ignition-kargs.service. Feb 12 22:08:18.599213 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 22:08:18.599244 kernel: audit: type=1130 audit(1707775698.522:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:18.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:18.533817 ignition[925]: Ignition 2.14.0 Feb 12 22:08:18.525803 systemd[1]: Starting ignition-disks.service... Feb 12 22:08:18.533820 ignition[925]: Stage: disks Feb 12 22:08:18.533876 ignition[925]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:08:18.533886 ignition[925]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 12 22:08:18.535218 ignition[925]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 12 22:08:18.536770 ignition[925]: disks: disks passed Feb 12 22:08:18.536773 ignition[925]: POST message to Packet Timeline Feb 12 22:08:18.536784 ignition[925]: GET https://metadata.packet.net/metadata: attempt #1 Feb 12 22:08:18.559674 ignition[925]: GET result: OK Feb 12 22:08:18.937141 ignition[925]: Ignition finished successfully Feb 12 22:08:18.939975 systemd[1]: Finished ignition-disks.service. Feb 12 22:08:18.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:18.955117 systemd[1]: Reached target initrd-root-device.target. Feb 12 22:08:19.026768 kernel: audit: type=1130 audit(1707775698.953:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.018698 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:08:19.035796 systemd[1]: Reached target local-fs.target. Feb 12 22:08:19.051786 systemd[1]: Reached target sysinit.target. Feb 12 22:08:19.067765 systemd[1]: Reached target basic.target. Feb 12 22:08:19.082657 systemd[1]: Starting systemd-fsck-root.service... Feb 12 22:08:19.114665 systemd-fsck[941]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 22:08:19.126090 systemd[1]: Finished systemd-fsck-root.service. Feb 12 22:08:19.220264 kernel: audit: type=1130 audit(1707775699.134:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.220284 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 22:08:19.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.137677 systemd[1]: Mounting sysroot.mount... Feb 12 22:08:19.228114 systemd[1]: Mounted sysroot.mount. Feb 12 22:08:19.242727 systemd[1]: Reached target initrd-root-fs.target. Feb 12 22:08:19.249478 systemd[1]: Mounting sysroot-usr.mount... Feb 12 22:08:19.275321 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 22:08:19.284033 systemd[1]: Starting flatcar-static-network.service... Feb 12 22:08:19.300632 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 22:08:19.300677 systemd[1]: Reached target ignition-diskful.target. Feb 12 22:08:19.320923 systemd[1]: Mounted sysroot-usr.mount. Feb 12 22:08:19.343364 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:08:19.438974 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (952) Feb 12 22:08:19.438989 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:08:19.438997 kernel: BTRFS info (device sdb6): using free space tree Feb 12 22:08:19.439007 kernel: BTRFS info (device sdb6): has skinny extents Feb 12 22:08:19.439015 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 12 22:08:19.357445 systemd[1]: Starting initrd-setup-root.service... Feb 12 22:08:19.548476 kernel: audit: type=1130 audit(1707775699.492:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.548520 coreos-metadata[948]: Feb 12 22:08:19.402 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 12 22:08:19.548520 coreos-metadata[948]: Feb 12 22:08:19.422 INFO Fetch successful Feb 12 22:08:19.548520 coreos-metadata[948]: Feb 12 22:08:19.439 INFO wrote hostname ci-3510.3.2-a-0de130baf6 to /sysroot/etc/hostname Feb 12 22:08:19.755733 kernel: audit: type=1130 audit(1707775699.556:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.755745 kernel: audit: type=1130 audit(1707775699.620:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.755753 kernel: audit: type=1131 audit(1707775699.620:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.755885 coreos-metadata[949]: Feb 12 22:08:19.400 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 12 22:08:19.755885 coreos-metadata[949]: Feb 12 22:08:19.422 INFO Fetch successful Feb 12 22:08:19.776664 initrd-setup-root[959]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 22:08:19.399441 systemd[1]: Finished initrd-setup-root.service. Feb 12 22:08:19.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.835652 initrd-setup-root[967]: cut: /sysroot/etc/group: No such file or directory Feb 12 22:08:19.875710 kernel: audit: type=1130 audit(1707775699.808:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:19.494803 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 22:08:19.884726 initrd-setup-root[975]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 22:08:19.557812 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 12 22:08:19.904712 initrd-setup-root[983]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 22:08:19.557850 systemd[1]: Finished flatcar-static-network.service. Feb 12 22:08:19.922753 ignition[1026]: INFO : Ignition 2.14.0 Feb 12 22:08:19.922753 ignition[1026]: INFO : Stage: mount Feb 12 22:08:19.922753 ignition[1026]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:08:19.922753 ignition[1026]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 12 22:08:19.922753 ignition[1026]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 12 22:08:19.922753 ignition[1026]: INFO : mount: mount passed Feb 12 22:08:19.922753 ignition[1026]: INFO : POST message to Packet Timeline Feb 12 22:08:19.922753 ignition[1026]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 12 22:08:19.922753 ignition[1026]: INFO : GET result: OK Feb 12 22:08:19.621738 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:08:19.742068 systemd[1]: Starting ignition-mount.service... Feb 12 22:08:19.763036 systemd[1]: Starting sysroot-boot.service... Feb 12 22:08:19.791442 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 22:08:19.791494 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 22:08:19.792274 systemd[1]: Finished sysroot-boot.service. Feb 12 22:08:20.058421 systemd[1]: Finished ignition-mount.service. Feb 12 22:08:20.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:20.127441 ignition[1026]: INFO : Ignition finished successfully Feb 12 22:08:20.143612 kernel: audit: type=1130 audit(1707775700.069:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:20.072615 systemd[1]: Starting ignition-files.service... Feb 12 22:08:20.136284 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:08:20.199635 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1040) Feb 12 22:08:20.199650 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:08:20.199657 kernel: BTRFS info (device sdb6): using free space tree Feb 12 22:08:20.222699 kernel: BTRFS info (device sdb6): has skinny extents Feb 12 22:08:20.270538 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 12 22:08:20.272392 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:08:20.288626 ignition[1059]: INFO : Ignition 2.14.0 Feb 12 22:08:20.288626 ignition[1059]: INFO : Stage: files Feb 12 22:08:20.288626 ignition[1059]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:08:20.288626 ignition[1059]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 12 22:08:20.288626 ignition[1059]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 12 22:08:20.291823 unknown[1059]: wrote ssh authorized keys file for user: core Feb 12 22:08:20.353719 ignition[1059]: DEBUG : files: compiled without relabeling support, skipping Feb 12 22:08:20.353719 ignition[1059]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 22:08:20.353719 ignition[1059]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 22:08:20.353719 ignition[1059]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 22:08:20.353719 ignition[1059]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 22:08:20.353719 ignition[1059]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 22:08:20.353719 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 22:08:20.353719 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 22:08:20.461714 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 22:08:20.561310 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 22:08:20.577782 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 22:08:20.577782 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 22:08:21.075665 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 22:08:21.152473 ignition[1059]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 22:08:21.152473 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 22:08:21.195694 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 22:08:21.195694 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 22:08:21.577769 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 22:08:21.626757 ignition[1059]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 22:08:21.626757 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 22:08:21.669694 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:08:21.669694 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 22:08:21.736015 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 22:08:21.910036 ignition[1059]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 22:08:21.910036 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:08:21.950683 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:08:21.950683 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 22:08:21.982701 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 22:08:22.454829 ignition[1059]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 22:08:22.479744 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:08:22.479744 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 22:08:22.479744 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 12 22:08:22.527691 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 22:08:22.694322 ignition[1059]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 12 22:08:22.745798 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1059) Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:08:22.745890 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2877632586" Feb 12 22:08:23.002824 ignition[1059]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2877632586": device or resource busy Feb 12 22:08:23.002824 ignition[1059]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2877632586", trying btrfs: device or resource busy Feb 12 22:08:23.002824 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2877632586" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2877632586" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2877632586" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2877632586" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Feb 12 22:08:23.002824 ignition[1059]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:08:23.406806 kernel: audit: type=1130 audit(1707775703.029:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(1d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(1d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(1e): [started] setting preset to enabled for "packet-phone-home.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(1e): [finished] setting preset to enabled for "packet-phone-home.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:08:23.407591 ignition[1059]: INFO : files: files passed Feb 12 22:08:23.407591 ignition[1059]: INFO : POST message to Packet Timeline Feb 12 22:08:23.407591 ignition[1059]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 12 22:08:23.407591 ignition[1059]: INFO : GET result: OK Feb 12 22:08:24.026733 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 22:08:24.026756 kernel: audit: type=1131 audit(1707775703.761:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.026765 kernel: audit: type=1131 audit(1707775703.866:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.026780 kernel: audit: type=1131 audit(1707775703.933:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.020272 systemd[1]: Finished ignition-files.service. Feb 12 22:08:24.040724 ignition[1059]: INFO : Ignition finished successfully Feb 12 22:08:23.039060 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 22:08:24.073918 initrd-setup-root-after-ignition[1092]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 22:08:23.105680 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 22:08:24.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.173504 kernel: audit: type=1131 audit(1707775704.104:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.106059 systemd[1]: Starting ignition-quench.service... Feb 12 22:08:24.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.145872 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 22:08:24.307001 kernel: audit: type=1131 audit(1707775704.180:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.307041 kernel: audit: type=1131 audit(1707775704.246:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.172021 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 22:08:23.172135 systemd[1]: Finished ignition-quench.service. Feb 12 22:08:23.196046 systemd[1]: Reached target ignition-complete.target. Feb 12 22:08:23.222617 systemd[1]: Starting initrd-parse-etc.service... Feb 12 22:08:24.367563 ignition[1107]: INFO : Ignition 2.14.0 Feb 12 22:08:24.367563 ignition[1107]: INFO : Stage: umount Feb 12 22:08:24.367563 ignition[1107]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:08:24.367563 ignition[1107]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 12 22:08:24.367563 ignition[1107]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 12 22:08:24.367563 ignition[1107]: INFO : umount: umount passed Feb 12 22:08:24.367563 ignition[1107]: INFO : POST message to Packet Timeline Feb 12 22:08:24.367563 ignition[1107]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 12 22:08:24.367563 ignition[1107]: INFO : GET result: OK Feb 12 22:08:24.711627 kernel: audit: type=1131 audit(1707775704.374:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.711656 kernel: audit: type=1131 audit(1707775704.443:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.711674 kernel: audit: type=1131 audit(1707775704.513:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.711696 kernel: audit: type=1131 audit(1707775704.582:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.239482 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 22:08:24.710000 audit: BPF prog-id=6 op=UNLOAD Feb 12 22:08:24.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.727908 ignition[1107]: INFO : Ignition finished successfully Feb 12 22:08:24.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.239535 systemd[1]: Finished initrd-parse-etc.service. Feb 12 22:08:24.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.269742 systemd[1]: Reached target initrd-fs.target. Feb 12 22:08:24.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.290738 systemd[1]: Reached target initrd.target. Feb 12 22:08:23.309900 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 22:08:24.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.312150 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 22:08:24.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.345670 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 22:08:24.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.359880 systemd[1]: Starting initrd-cleanup.service... Feb 12 22:08:23.391379 systemd[1]: Stopped target network.target. Feb 12 22:08:24.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.415061 systemd[1]: Stopped target nss-lookup.target. Feb 12 22:08:24.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.442199 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 22:08:23.463142 systemd[1]: Stopped target timers.target. Feb 12 22:08:23.482042 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 22:08:24.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.482398 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 22:08:24.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.507365 systemd[1]: Stopped target initrd.target. Feb 12 22:08:24.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.531200 systemd[1]: Stopped target basic.target. Feb 12 22:08:23.550077 systemd[1]: Stopped target ignition-complete.target. Feb 12 22:08:24.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.572075 systemd[1]: Stopped target ignition-diskful.target. Feb 12 22:08:25.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.594064 systemd[1]: Stopped target initrd-root-device.target. Feb 12 22:08:25.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.615082 systemd[1]: Stopped target remote-fs.target. Feb 12 22:08:25.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:25.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.636193 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 22:08:23.658099 systemd[1]: Stopped target sysinit.target. Feb 12 22:08:23.680078 systemd[1]: Stopped target local-fs.target. Feb 12 22:08:23.701073 systemd[1]: Stopped target local-fs-pre.target. Feb 12 22:08:23.722068 systemd[1]: Stopped target swap.target. Feb 12 22:08:23.741937 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 22:08:23.742289 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 22:08:23.763290 systemd[1]: Stopped target cryptsetup.target. Feb 12 22:08:23.851786 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 22:08:23.851864 systemd[1]: Stopped dracut-initqueue.service. Feb 12 22:08:23.867886 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 22:08:23.867957 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 22:08:23.934893 systemd[1]: Stopped target paths.target. Feb 12 22:08:24.000763 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 22:08:24.002733 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 22:08:24.011798 systemd[1]: Stopped target slices.target. Feb 12 22:08:25.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:24.033767 systemd[1]: Stopped target sockets.target. Feb 12 22:08:24.048762 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 22:08:24.048823 systemd[1]: Closed iscsid.socket. Feb 12 22:08:24.063918 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 22:08:24.063991 systemd[1]: Closed iscsiuio.socket. Feb 12 22:08:24.080874 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 22:08:24.081039 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 22:08:24.106301 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 22:08:25.280346 iscsid[906]: iscsid shutting down. Feb 12 22:08:24.106664 systemd[1]: Stopped ignition-files.service. Feb 12 22:08:24.181733 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 22:08:24.181795 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 22:08:24.248246 systemd[1]: Stopping ignition-mount.service... Feb 12 22:08:24.314277 systemd[1]: Stopping sysroot-boot.service... Feb 12 22:08:25.280515 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Feb 12 22:08:24.330220 systemd[1]: Stopping systemd-networkd.service... Feb 12 22:08:24.342625 systemd-networkd[880]: enp2s0f1np1: DHCPv6 lease lost Feb 12 22:08:24.344265 systemd[1]: Stopping systemd-resolved.service... Feb 12 22:08:24.350641 systemd-networkd[880]: enp2s0f0np0: DHCPv6 lease lost Feb 12 22:08:25.279000 audit: BPF prog-id=9 op=UNLOAD Feb 12 22:08:24.359652 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 22:08:24.359794 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 22:08:24.375746 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 22:08:24.375827 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 22:08:24.446235 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 22:08:24.446730 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 22:08:24.446772 systemd[1]: Stopped systemd-resolved.service. Feb 12 22:08:24.514984 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 22:08:24.515026 systemd[1]: Stopped systemd-networkd.service. Feb 12 22:08:24.584671 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 22:08:24.584712 systemd[1]: Stopped sysroot-boot.service. Feb 12 22:08:24.653885 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 22:08:24.653924 systemd[1]: Stopped ignition-mount.service. Feb 12 22:08:24.678928 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 22:08:24.678975 systemd[1]: Closed systemd-networkd.socket. Feb 12 22:08:24.704663 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 22:08:24.704696 systemd[1]: Stopped ignition-disks.service. Feb 12 22:08:24.719663 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 22:08:24.719709 systemd[1]: Stopped ignition-kargs.service. Feb 12 22:08:24.735811 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 22:08:24.735903 systemd[1]: Stopped ignition-setup.service. Feb 12 22:08:24.751895 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 22:08:24.752038 systemd[1]: Stopped initrd-setup-root.service. Feb 12 22:08:24.768616 systemd[1]: Stopping network-cleanup.service... Feb 12 22:08:24.780679 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 22:08:24.780828 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 22:08:24.795844 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 22:08:24.795975 systemd[1]: Stopped systemd-sysctl.service. Feb 12 22:08:24.815174 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 22:08:24.815314 systemd[1]: Stopped systemd-modules-load.service. Feb 12 22:08:24.832234 systemd[1]: Stopping systemd-udevd.service... Feb 12 22:08:24.849549 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 22:08:24.850335 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 22:08:24.850396 systemd[1]: Stopped systemd-udevd.service. Feb 12 22:08:24.862637 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 22:08:24.862685 systemd[1]: Finished initrd-cleanup.service. Feb 12 22:08:24.878045 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 22:08:24.878082 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 22:08:24.891760 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 22:08:24.891791 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 22:08:24.907867 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 22:08:24.907950 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 22:08:24.922944 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 22:08:24.923055 systemd[1]: Stopped dracut-cmdline.service. Feb 12 22:08:24.939609 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 22:08:24.939633 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 22:08:24.956108 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 22:08:24.970573 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 22:08:24.970626 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 22:08:24.985799 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 22:08:24.985868 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 22:08:25.001792 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 22:08:25.001903 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 22:08:25.020044 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 22:08:25.021287 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 22:08:25.021486 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 22:08:25.158088 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 22:08:25.158300 systemd[1]: Stopped network-cleanup.service. Feb 12 22:08:25.167035 systemd[1]: Reached target initrd-switch-root.target. Feb 12 22:08:25.185185 systemd[1]: Starting initrd-switch-root.service... Feb 12 22:08:25.223291 systemd[1]: Switching root. Feb 12 22:08:25.281851 systemd-journald[268]: Journal stopped Feb 12 22:08:29.272411 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 22:08:29.272426 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 22:08:29.272434 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 22:08:29.272439 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 22:08:29.272444 kernel: SELinux: policy capability open_perms=1 Feb 12 22:08:29.272449 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 22:08:29.272455 kernel: SELinux: policy capability always_check_network=0 Feb 12 22:08:29.272461 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 22:08:29.272466 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 22:08:29.272471 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 22:08:29.272479 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 22:08:29.272485 systemd[1]: Successfully loaded SELinux policy in 310.994ms. Feb 12 22:08:29.272495 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.913ms. Feb 12 22:08:29.272504 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:08:29.272512 systemd[1]: Detected architecture x86-64. Feb 12 22:08:29.272518 systemd[1]: Detected first boot. Feb 12 22:08:29.272524 systemd[1]: Hostname set to . Feb 12 22:08:29.272530 systemd[1]: Initializing machine ID from random generator. Feb 12 22:08:29.272536 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 22:08:29.272542 systemd[1]: Populated /etc with preset unit settings. Feb 12 22:08:29.272548 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:08:29.272555 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:08:29.272561 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:08:29.272568 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 22:08:29.272574 systemd[1]: Stopped iscsiuio.service. Feb 12 22:08:29.272580 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 22:08:29.272587 systemd[1]: Stopped iscsid.service. Feb 12 22:08:29.272593 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 22:08:29.272599 systemd[1]: Stopped initrd-switch-root.service. Feb 12 22:08:29.272605 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 22:08:29.272611 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 22:08:29.272617 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 22:08:29.272623 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 22:08:29.272629 systemd[1]: Created slice system-getty.slice. Feb 12 22:08:29.272636 systemd[1]: Created slice system-modprobe.slice. Feb 12 22:08:29.272642 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 22:08:29.272648 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 22:08:29.272654 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 22:08:29.272660 systemd[1]: Created slice user.slice. Feb 12 22:08:29.272669 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:08:29.272678 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 22:08:29.272685 systemd[1]: Set up automount boot.automount. Feb 12 22:08:29.272691 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 22:08:29.272698 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 22:08:29.272705 systemd[1]: Stopped target initrd-fs.target. Feb 12 22:08:29.272711 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 22:08:29.272717 systemd[1]: Reached target integritysetup.target. Feb 12 22:08:29.272723 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:08:29.272730 systemd[1]: Reached target remote-fs.target. Feb 12 22:08:29.272736 systemd[1]: Reached target slices.target. Feb 12 22:08:29.272742 systemd[1]: Reached target swap.target. Feb 12 22:08:29.272749 systemd[1]: Reached target torcx.target. Feb 12 22:08:29.272756 systemd[1]: Reached target veritysetup.target. Feb 12 22:08:29.272762 systemd[1]: Listening on systemd-coredump.socket. Feb 12 22:08:29.272768 systemd[1]: Listening on systemd-initctl.socket. Feb 12 22:08:29.272775 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:08:29.272782 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:08:29.272788 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:08:29.272794 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 22:08:29.272801 systemd[1]: Mounting dev-hugepages.mount... Feb 12 22:08:29.272807 systemd[1]: Mounting dev-mqueue.mount... Feb 12 22:08:29.272813 systemd[1]: Mounting media.mount... Feb 12 22:08:29.272820 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:08:29.272826 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 22:08:29.272834 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 22:08:29.272840 systemd[1]: Mounting tmp.mount... Feb 12 22:08:29.272847 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 22:08:29.272853 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 22:08:29.272875 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:08:29.272881 systemd[1]: Starting modprobe@configfs.service... Feb 12 22:08:29.272888 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 22:08:29.272894 systemd[1]: Starting modprobe@drm.service... Feb 12 22:08:29.272900 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 22:08:29.272907 systemd[1]: Starting modprobe@fuse.service... Feb 12 22:08:29.272913 kernel: fuse: init (API version 7.34) Feb 12 22:08:29.272919 systemd[1]: Starting modprobe@loop.service... Feb 12 22:08:29.272925 kernel: loop: module loaded Feb 12 22:08:29.272931 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 22:08:29.272937 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 22:08:29.272943 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 22:08:29.272950 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 22:08:29.272957 kernel: kauditd_printk_skb: 64 callbacks suppressed Feb 12 22:08:29.272963 kernel: audit: type=1131 audit(1707775708.913:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.272969 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 22:08:29.272975 kernel: audit: type=1131 audit(1707775709.001:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.272981 systemd[1]: Stopped systemd-journald.service. Feb 12 22:08:29.272987 kernel: audit: type=1130 audit(1707775709.065:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.272993 kernel: audit: type=1131 audit(1707775709.065:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.272999 kernel: audit: type=1334 audit(1707775709.150:119): prog-id=21 op=LOAD Feb 12 22:08:29.273005 kernel: audit: type=1334 audit(1707775709.169:120): prog-id=22 op=LOAD Feb 12 22:08:29.273011 kernel: audit: type=1334 audit(1707775709.187:121): prog-id=23 op=LOAD Feb 12 22:08:29.273016 kernel: audit: type=1334 audit(1707775709.205:122): prog-id=19 op=UNLOAD Feb 12 22:08:29.273022 systemd[1]: Starting systemd-journald.service... Feb 12 22:08:29.273028 kernel: audit: type=1334 audit(1707775709.205:123): prog-id=20 op=UNLOAD Feb 12 22:08:29.273034 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:08:29.273040 kernel: audit: type=1305 audit(1707775709.269:124): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 22:08:29.273047 systemd-journald[1259]: Journal started Feb 12 22:08:29.273072 systemd-journald[1259]: Runtime Journal (/run/log/journal/84b6d5268ff948a8a4484719ebf82320) is 8.0M, max 639.3M, 631.3M free. Feb 12 22:08:25.686000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 22:08:25.956000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 22:08:25.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:08:25.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:08:25.959000 audit: BPF prog-id=10 op=LOAD Feb 12 22:08:25.959000 audit: BPF prog-id=10 op=UNLOAD Feb 12 22:08:25.959000 audit: BPF prog-id=11 op=LOAD Feb 12 22:08:25.959000 audit: BPF prog-id=11 op=UNLOAD Feb 12 22:08:26.027000 audit[1149]: AVC avc: denied { associate } for pid=1149 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 22:08:26.027000 audit[1149]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001278dc a1=c00002ce58 a2=c00002bb00 a3=32 items=0 ppid=1132 pid=1149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:26.027000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:08:26.054000 audit[1149]: AVC avc: denied { associate } for pid=1149 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 22:08:26.054000 audit[1149]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001279b5 a2=1ed a3=0 items=2 ppid=1132 pid=1149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:26.054000 audit: CWD cwd="/" Feb 12 22:08:26.054000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:26.054000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:26.054000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:08:27.575000 audit: BPF prog-id=12 op=LOAD Feb 12 22:08:27.575000 audit: BPF prog-id=3 op=UNLOAD Feb 12 22:08:27.575000 audit: BPF prog-id=13 op=LOAD Feb 12 22:08:27.575000 audit: BPF prog-id=14 op=LOAD Feb 12 22:08:27.575000 audit: BPF prog-id=4 op=UNLOAD Feb 12 22:08:27.575000 audit: BPF prog-id=5 op=UNLOAD Feb 12 22:08:27.575000 audit: BPF prog-id=15 op=LOAD Feb 12 22:08:27.575000 audit: BPF prog-id=12 op=UNLOAD Feb 12 22:08:27.576000 audit: BPF prog-id=16 op=LOAD Feb 12 22:08:27.576000 audit: BPF prog-id=17 op=LOAD Feb 12 22:08:27.576000 audit: BPF prog-id=13 op=UNLOAD Feb 12 22:08:27.576000 audit: BPF prog-id=14 op=UNLOAD Feb 12 22:08:27.576000 audit: BPF prog-id=18 op=LOAD Feb 12 22:08:27.576000 audit: BPF prog-id=15 op=UNLOAD Feb 12 22:08:27.576000 audit: BPF prog-id=19 op=LOAD Feb 12 22:08:27.577000 audit: BPF prog-id=20 op=LOAD Feb 12 22:08:27.577000 audit: BPF prog-id=16 op=UNLOAD Feb 12 22:08:27.577000 audit: BPF prog-id=17 op=UNLOAD Feb 12 22:08:27.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:27.624000 audit: BPF prog-id=18 op=UNLOAD Feb 12 22:08:27.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:27.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:27.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:27.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:28.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.150000 audit: BPF prog-id=21 op=LOAD Feb 12 22:08:29.169000 audit: BPF prog-id=22 op=LOAD Feb 12 22:08:29.187000 audit: BPF prog-id=23 op=LOAD Feb 12 22:08:29.205000 audit: BPF prog-id=19 op=UNLOAD Feb 12 22:08:29.205000 audit: BPF prog-id=20 op=UNLOAD Feb 12 22:08:29.269000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 22:08:26.026461 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:08:27.574773 systemd[1]: Queued start job for default target multi-user.target. Feb 12 22:08:26.027059 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:08:27.578828 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 22:08:26.027073 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:08:26.027095 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 22:08:26.027102 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 22:08:26.027124 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 22:08:26.027132 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 22:08:26.027266 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 22:08:26.027291 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:08:26.027300 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:08:26.027717 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 22:08:26.027740 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 22:08:26.027753 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 22:08:26.027763 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 22:08:26.027774 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 22:08:26.027783 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 22:08:27.220324 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:08:27.220464 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:08:27.220529 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:08:27.220622 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:08:27.220651 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 22:08:27.220684 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-02-12T22:08:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 22:08:29.269000 audit[1259]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc51a5abc0 a2=4000 a3=7ffc51a5ac5c items=0 ppid=1 pid=1259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:29.269000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 22:08:29.351671 systemd[1]: Starting systemd-network-generator.service... Feb 12 22:08:29.378518 systemd[1]: Starting systemd-remount-fs.service... Feb 12 22:08:29.405532 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:08:29.448264 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 22:08:29.448286 systemd[1]: Stopped verity-setup.service. Feb 12 22:08:29.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.493522 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:08:29.513669 systemd[1]: Started systemd-journald.service. Feb 12 22:08:29.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.522120 systemd[1]: Mounted dev-hugepages.mount. Feb 12 22:08:29.529749 systemd[1]: Mounted dev-mqueue.mount. Feb 12 22:08:29.536753 systemd[1]: Mounted media.mount. Feb 12 22:08:29.543747 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 22:08:29.552756 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 22:08:29.561728 systemd[1]: Mounted tmp.mount. Feb 12 22:08:29.568793 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 22:08:29.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.577862 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:08:29.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.586866 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 22:08:29.586968 systemd[1]: Finished modprobe@configfs.service. Feb 12 22:08:29.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.595874 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 22:08:29.595992 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 22:08:29.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.604946 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 22:08:29.605097 systemd[1]: Finished modprobe@drm.service. Feb 12 22:08:29.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.614120 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 22:08:29.614339 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 22:08:29.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.623309 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 22:08:29.623779 systemd[1]: Finished modprobe@fuse.service. Feb 12 22:08:29.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.632413 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 22:08:29.632728 systemd[1]: Finished modprobe@loop.service. Feb 12 22:08:29.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.641341 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:08:29.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.650369 systemd[1]: Finished systemd-network-generator.service. Feb 12 22:08:29.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.659256 systemd[1]: Finished systemd-remount-fs.service. Feb 12 22:08:29.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.669310 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:08:29.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.679793 systemd[1]: Reached target network-pre.target. Feb 12 22:08:29.692343 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 22:08:29.702178 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 22:08:29.710677 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 22:08:29.711799 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 22:08:29.719144 systemd[1]: Starting systemd-journal-flush.service... Feb 12 22:08:29.722642 systemd-journald[1259]: Time spent on flushing to /var/log/journal/84b6d5268ff948a8a4484719ebf82320 is 15.111ms for 1661 entries. Feb 12 22:08:29.722642 systemd-journald[1259]: System Journal (/var/log/journal/84b6d5268ff948a8a4484719ebf82320) is 8.0M, max 195.6M, 187.6M free. Feb 12 22:08:29.762629 systemd-journald[1259]: Received client request to flush runtime journal. Feb 12 22:08:29.735608 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 22:08:29.736084 systemd[1]: Starting systemd-random-seed.service... Feb 12 22:08:29.751603 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 22:08:29.752105 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:08:29.759330 systemd[1]: Starting systemd-sysusers.service... Feb 12 22:08:29.767131 systemd[1]: Starting systemd-udev-settle.service... Feb 12 22:08:29.775864 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 22:08:29.783629 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 22:08:29.791670 systemd[1]: Finished systemd-journal-flush.service. Feb 12 22:08:29.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.799688 systemd[1]: Finished systemd-random-seed.service. Feb 12 22:08:29.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.807669 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:08:29.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.815644 systemd[1]: Finished systemd-sysusers.service. Feb 12 22:08:29.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:29.824675 systemd[1]: Reached target first-boot-complete.target. Feb 12 22:08:29.833217 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:08:29.842639 udevadm[1275]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 22:08:29.851613 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:08:29.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.013337 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 22:08:30.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.020000 audit: BPF prog-id=24 op=LOAD Feb 12 22:08:30.020000 audit: BPF prog-id=25 op=LOAD Feb 12 22:08:30.020000 audit: BPF prog-id=7 op=UNLOAD Feb 12 22:08:30.020000 audit: BPF prog-id=8 op=UNLOAD Feb 12 22:08:30.022719 systemd[1]: Starting systemd-udevd.service... Feb 12 22:08:30.033967 systemd-udevd[1278]: Using default interface naming scheme 'v252'. Feb 12 22:08:30.053869 systemd[1]: Started systemd-udevd.service. Feb 12 22:08:30.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.063709 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 12 22:08:30.062000 audit: BPF prog-id=26 op=LOAD Feb 12 22:08:30.064796 systemd[1]: Starting systemd-networkd.service... Feb 12 22:08:30.109286 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 12 22:08:30.109331 kernel: ACPI: button: Sleep Button [SLPB] Feb 12 22:08:30.109343 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1338) Feb 12 22:08:30.134484 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 12 22:08:30.153000 audit: BPF prog-id=27 op=LOAD Feb 12 22:08:30.153000 audit: BPF prog-id=28 op=LOAD Feb 12 22:08:30.153000 audit: BPF prog-id=29 op=LOAD Feb 12 22:08:30.155586 systemd[1]: Starting systemd-userdbd.service... Feb 12 22:08:30.170334 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:08:30.178501 kernel: ACPI: button: Power Button [PWRF] Feb 12 22:08:30.099000 audit[1350]: AVC avc: denied { confidentiality } for pid=1350 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 22:08:30.204480 kernel: IPMI message handler: version 39.2 Feb 12 22:08:30.218074 systemd[1]: Started systemd-userdbd.service. Feb 12 22:08:30.224480 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 22:08:30.099000 audit[1350]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe13b5b8010 a1=4d8bc a2=7fe13d223bc5 a3=5 items=42 ppid=1278 pid=1350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:30.099000 audit: CWD cwd="/" Feb 12 22:08:30.099000 audit: PATH item=0 name=(null) inode=1039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=1 name=(null) inode=28630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=2 name=(null) inode=28630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=3 name=(null) inode=28631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=4 name=(null) inode=28630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=5 name=(null) inode=28632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=6 name=(null) inode=28630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=7 name=(null) inode=28633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=8 name=(null) inode=28633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=9 name=(null) inode=28634 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=10 name=(null) inode=28633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=11 name=(null) inode=28635 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=12 name=(null) inode=28633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=13 name=(null) inode=28636 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=14 name=(null) inode=28633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=15 name=(null) inode=28637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=16 name=(null) inode=28633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=17 name=(null) inode=28638 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=18 name=(null) inode=28630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=19 name=(null) inode=28639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=20 name=(null) inode=28639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=21 name=(null) inode=28640 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=22 name=(null) inode=28639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=23 name=(null) inode=28641 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=24 name=(null) inode=28639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=25 name=(null) inode=28642 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=26 name=(null) inode=28639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=27 name=(null) inode=28643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=28 name=(null) inode=28639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=29 name=(null) inode=28644 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=30 name=(null) inode=28630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=31 name=(null) inode=28645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=32 name=(null) inode=28645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=33 name=(null) inode=28646 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=34 name=(null) inode=28645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=35 name=(null) inode=28647 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=36 name=(null) inode=28645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=37 name=(null) inode=28648 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=38 name=(null) inode=28645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=39 name=(null) inode=28649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=40 name=(null) inode=28645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PATH item=41 name=(null) inode=28650 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:08:30.099000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 22:08:30.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.272514 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 12 22:08:30.272718 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 12 22:08:30.294488 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 12 22:08:30.321482 kernel: ipmi device interface Feb 12 22:08:30.322483 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 12 22:08:30.322621 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 12 22:08:30.322730 kernel: iTCO_vendor_support: vendor-support=0 Feb 12 22:08:30.419741 kernel: ipmi_si: IPMI System Interface driver Feb 12 22:08:30.419801 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 12 22:08:30.419874 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 12 22:08:30.440701 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 12 22:08:30.460352 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 12 22:08:30.501309 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 12 22:08:30.528508 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 12 22:08:30.528724 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 12 22:08:30.544946 systemd-networkd[1314]: bond0: netdev ready Feb 12 22:08:30.547493 systemd-networkd[1314]: lo: Link UP Feb 12 22:08:30.547496 systemd-networkd[1314]: lo: Gained carrier Feb 12 22:08:30.548067 systemd-networkd[1314]: Enumeration completed Feb 12 22:08:30.548128 systemd[1]: Started systemd-networkd.service. Feb 12 22:08:30.548460 systemd-networkd[1314]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 12 22:08:30.551843 systemd-networkd[1314]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d9:8e:9f.network. Feb 12 22:08:30.568126 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 12 22:08:30.568262 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 12 22:08:30.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.648806 kernel: intel_rapl_common: Found RAPL domain package Feb 12 22:08:30.648845 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 12 22:08:30.648968 kernel: intel_rapl_common: Found RAPL domain core Feb 12 22:08:30.682223 kernel: intel_rapl_common: Found RAPL domain uncore Feb 12 22:08:30.682249 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 12 22:08:30.682325 kernel: intel_rapl_common: Found RAPL domain dram Feb 12 22:08:30.760478 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 12 22:08:30.779479 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 12 22:08:30.781727 systemd[1]: Finished systemd-udev-settle.service. Feb 12 22:08:30.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.791202 systemd[1]: Starting lvm2-activation-early.service... Feb 12 22:08:30.806049 lvm[1382]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:08:30.846862 systemd[1]: Finished lvm2-activation-early.service. Feb 12 22:08:30.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.854551 systemd[1]: Reached target cryptsetup.target. Feb 12 22:08:30.863032 systemd[1]: Starting lvm2-activation.service... Feb 12 22:08:30.865081 lvm[1383]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:08:30.891860 systemd[1]: Finished lvm2-activation.service. Feb 12 22:08:30.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.900546 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:08:30.909513 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 22:08:30.909538 systemd[1]: Reached target local-fs.target. Feb 12 22:08:30.918510 systemd[1]: Reached target machines.target. Feb 12 22:08:30.928097 systemd[1]: Starting ldconfig.service... Feb 12 22:08:30.935907 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 22:08:30.935942 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:08:30.936530 systemd[1]: Starting systemd-boot-update.service... Feb 12 22:08:30.945017 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 22:08:30.956099 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 22:08:30.956179 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:08:30.956202 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:08:30.956729 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 22:08:30.956934 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1385 (bootctl) Feb 12 22:08:30.957637 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 22:08:30.966565 systemd-tmpfiles[1389]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 22:08:30.977936 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 22:08:30.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.979338 systemd-tmpfiles[1389]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 22:08:30.985137 systemd-tmpfiles[1389]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 22:08:31.499172 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 22:08:31.499513 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 22:08:31.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:31.532973 systemd-fsck[1393]: fsck.fat 4.2 (2021-01-31) Feb 12 22:08:31.532973 systemd-fsck[1393]: /dev/sdb1: 789 files, 115339/258078 clusters Feb 12 22:08:31.533702 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 22:08:31.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:31.546368 systemd[1]: Mounting boot.mount... Feb 12 22:08:31.557954 systemd[1]: Mounted boot.mount. Feb 12 22:08:31.575411 systemd[1]: Finished systemd-boot-update.service. Feb 12 22:08:31.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:31.606895 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 22:08:31.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:31.615472 systemd[1]: Starting audit-rules.service... Feb 12 22:08:31.626123 systemd[1]: Starting clean-ca-certificates.service... Feb 12 22:08:31.636192 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 22:08:31.637000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 22:08:31.637000 audit[1413]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf3fd2c80 a2=420 a3=0 items=0 ppid=1397 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:31.637000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 22:08:31.639455 augenrules[1413]: No rules Feb 12 22:08:31.646520 systemd[1]: Starting systemd-resolved.service... Feb 12 22:08:31.654422 systemd[1]: Starting systemd-timesyncd.service... Feb 12 22:08:31.662017 systemd[1]: Starting systemd-update-utmp.service... Feb 12 22:08:31.668833 systemd[1]: Finished audit-rules.service. Feb 12 22:08:31.675682 systemd[1]: Finished clean-ca-certificates.service. Feb 12 22:08:31.683680 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 22:08:31.694737 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 22:08:31.695221 systemd[1]: Finished systemd-update-utmp.service. Feb 12 22:08:31.719481 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 12 22:08:31.720965 ldconfig[1384]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 22:08:31.723314 systemd[1]: Finished ldconfig.service. Feb 12 22:08:31.729876 systemd-resolved[1419]: Positive Trust Anchors: Feb 12 22:08:31.729881 systemd-resolved[1419]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:08:31.729899 systemd-resolved[1419]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:08:31.733965 systemd-resolved[1419]: Using system hostname 'ci-3510.3.2-a-0de130baf6'. Feb 12 22:08:31.738620 systemd[1]: Started systemd-timesyncd.service. Feb 12 22:08:31.745551 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 12 22:08:31.746269 systemd-networkd[1314]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d9:8e:9e.network. Feb 12 22:08:31.753614 systemd[1]: Started systemd-resolved.service. Feb 12 22:08:31.762597 systemd[1]: Reached target network.target. Feb 12 22:08:31.770557 systemd[1]: Reached target nss-lookup.target. Feb 12 22:08:31.779567 systemd[1]: Reached target time-set.target. Feb 12 22:08:31.788210 systemd[1]: Starting systemd-update-done.service... Feb 12 22:08:31.794709 systemd[1]: Finished systemd-update-done.service. Feb 12 22:08:31.802611 systemd[1]: Reached target sysinit.target. Feb 12 22:08:31.810702 systemd[1]: Started motdgen.path. Feb 12 22:08:31.826591 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 22:08:31.835554 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 12 22:08:31.845802 systemd[1]: Started logrotate.timer. Feb 12 22:08:31.853742 systemd[1]: Started mdadm.timer. Feb 12 22:08:31.860655 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 22:08:31.868622 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 22:08:31.868641 systemd[1]: Reached target paths.target. Feb 12 22:08:31.875612 systemd[1]: Reached target timers.target. Feb 12 22:08:31.882804 systemd[1]: Listening on dbus.socket. Feb 12 22:08:31.890397 systemd[1]: Starting docker.socket... Feb 12 22:08:31.900418 systemd[1]: Listening on sshd.socket. Feb 12 22:08:31.907870 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:08:31.908662 systemd[1]: Listening on docker.socket. Feb 12 22:08:31.915938 systemd[1]: Reached target sockets.target. Feb 12 22:08:31.927332 systemd[1]: Reached target basic.target. Feb 12 22:08:31.935691 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:08:31.935706 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:08:31.936184 systemd[1]: Starting containerd.service... Feb 12 22:08:31.950380 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 22:08:31.961521 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 12 22:08:31.971105 systemd[1]: Starting coreos-metadata.service... Feb 12 22:08:31.982060 systemd[1]: Starting dbus.service... Feb 12 22:08:31.982289 coreos-metadata[1427]: Feb 12 22:08:31.982 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 12 22:08:31.986508 coreos-metadata[1427]: Feb 12 22:08:31.986 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 12 22:08:31.993481 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 12 22:08:32.000349 coreos-metadata[1430]: Feb 12 22:08:32.000 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 12 22:08:32.000966 coreos-metadata[1430]: Feb 12 22:08:32.000 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 12 22:08:32.001203 dbus-daemon[1433]: [system] SELinux support is enabled Feb 12 22:08:32.005667 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 22:08:32.010537 jq[1436]: false Feb 12 22:08:32.017551 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 12 22:08:32.017610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 12 22:08:32.051086 systemd[1]: Starting extend-filesystems.service... Feb 12 22:08:32.054933 systemd-networkd[1314]: bond0: Link UP Feb 12 22:08:32.055151 systemd-networkd[1314]: enp2s0f1np1: Link UP Feb 12 22:08:32.055297 systemd-networkd[1314]: enp2s0f1np1: Gained carrier Feb 12 22:08:32.055481 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 12 22:08:32.055498 kernel: bond0: active interface up! Feb 12 22:08:32.056263 systemd-networkd[1314]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d9:8e:9e.network. Feb 12 22:08:32.058706 extend-filesystems[1437]: Found sda Feb 12 22:08:32.058706 extend-filesystems[1437]: Found sdb Feb 12 22:08:32.111548 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 12 22:08:32.111577 extend-filesystems[1437]: Found sdb1 Feb 12 22:08:32.111577 extend-filesystems[1437]: Found sdb2 Feb 12 22:08:32.111577 extend-filesystems[1437]: Found sdb3 Feb 12 22:08:32.111577 extend-filesystems[1437]: Found usr Feb 12 22:08:32.111577 extend-filesystems[1437]: Found sdb4 Feb 12 22:08:32.111577 extend-filesystems[1437]: Found sdb6 Feb 12 22:08:32.111577 extend-filesystems[1437]: Found sdb7 Feb 12 22:08:32.111577 extend-filesystems[1437]: Found sdb9 Feb 12 22:08:32.111577 extend-filesystems[1437]: Checking size of /dev/sdb9 Feb 12 22:08:32.111577 extend-filesystems[1437]: Resized partition /dev/sdb9 Feb 12 22:08:32.351629 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 12 22:08:32.351658 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 12 22:08:32.351671 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 12 22:08:32.351683 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 12 22:08:32.351695 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 12 22:08:32.351706 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 12 22:08:32.351715 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 12 22:08:32.351727 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 12 22:08:32.351741 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 25000 Mbps full duplex Feb 12 22:08:32.089433 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 22:08:32.351860 extend-filesystems[1444]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 22:08:32.090133 systemd[1]: Starting motdgen.service... Feb 12 22:08:32.104198 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 22:08:32.119059 systemd[1]: Starting prepare-critools.service... Feb 12 22:08:32.138037 systemd[1]: Starting prepare-helm.service... Feb 12 22:08:32.157025 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 22:08:32.221023 systemd[1]: Starting sshd-keygen.service... Feb 12 22:08:32.246489 systemd[1]: Starting systemd-logind.service... Feb 12 22:08:32.282570 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:08:32.368148 jq[1468]: true Feb 12 22:08:32.283077 systemd[1]: Starting tcsd.service... Feb 12 22:08:32.288524 systemd-networkd[1314]: enp2s0f0np0: Link UP Feb 12 22:08:32.288677 systemd-networkd[1314]: bond0: Gained carrier Feb 12 22:08:32.288807 systemd-networkd[1314]: enp2s0f0np0: Gained carrier Feb 12 22:08:32.288819 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:32.343522 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 22:08:32.343884 systemd[1]: Starting update-engine.service... Feb 12 22:08:32.353919 systemd-logind[1464]: Watching system buttons on /dev/input/event3 (Power Button) Feb 12 22:08:32.353929 systemd-logind[1464]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 12 22:08:32.353938 systemd-logind[1464]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 12 22:08:32.354034 systemd-logind[1464]: New seat seat0. Feb 12 22:08:32.356681 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:32.356823 systemd-networkd[1314]: enp2s0f1np1: Link DOWN Feb 12 22:08:32.356825 systemd-networkd[1314]: enp2s0f1np1: Lost carrier Feb 12 22:08:32.360342 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 22:08:32.375882 systemd[1]: Started dbus.service. Feb 12 22:08:32.378684 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:32.378877 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:32.385452 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 22:08:32.385580 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 22:08:32.385798 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 22:08:32.385907 systemd[1]: Finished motdgen.service. Feb 12 22:08:32.386201 update_engine[1467]: I0212 22:08:32.385710 1467 main.cc:92] Flatcar Update Engine starting Feb 12 22:08:32.388687 update_engine[1467]: I0212 22:08:32.388672 1467 update_check_scheduler.cc:74] Next update check in 10m57s Feb 12 22:08:32.394044 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 22:08:32.394150 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 22:08:32.398000 tar[1470]: ./ Feb 12 22:08:32.398000 tar[1470]: ./macvlan Feb 12 22:08:32.405267 jq[1476]: true Feb 12 22:08:32.407381 dbus-daemon[1433]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 22:08:32.408714 tar[1472]: linux-amd64/helm Feb 12 22:08:32.410443 tar[1471]: crictl Feb 12 22:08:32.413308 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 12 22:08:32.413426 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 12 22:08:32.414915 env[1477]: time="2024-02-12T22:08:32.414866656Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 22:08:32.421336 tar[1470]: ./static Feb 12 22:08:32.421537 systemd[1]: Started update-engine.service. Feb 12 22:08:32.425800 env[1477]: time="2024-02-12T22:08:32.425753057Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 22:08:32.427009 env[1477]: time="2024-02-12T22:08:32.426961262Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:08:32.427627 env[1477]: time="2024-02-12T22:08:32.427582055Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:08:32.427627 env[1477]: time="2024-02-12T22:08:32.427604089Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:08:32.427791 env[1477]: time="2024-02-12T22:08:32.427752537Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:08:32.427791 env[1477]: time="2024-02-12T22:08:32.427768212Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 22:08:32.427791 env[1477]: time="2024-02-12T22:08:32.427778768Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 22:08:32.427791 env[1477]: time="2024-02-12T22:08:32.427786977Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 22:08:32.427873 env[1477]: time="2024-02-12T22:08:32.427840514Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:08:32.429651 systemd[1]: Started systemd-logind.service. Feb 12 22:08:32.430176 env[1477]: time="2024-02-12T22:08:32.430140199Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:08:32.432066 env[1477]: time="2024-02-12T22:08:32.430243793Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:08:32.432066 env[1477]: time="2024-02-12T22:08:32.430259886Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 22:08:32.432876 env[1477]: time="2024-02-12T22:08:32.432835856Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 22:08:32.432876 env[1477]: time="2024-02-12T22:08:32.432850525Z" level=info msg="metadata content store policy set" policy=shared Feb 12 22:08:32.439707 systemd[1]: Started locksmithd.service. Feb 12 22:08:32.443682 bash[1504]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:08:32.446528 env[1477]: time="2024-02-12T22:08:32.446509177Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 22:08:32.446566 env[1477]: time="2024-02-12T22:08:32.446537198Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 22:08:32.446566 env[1477]: time="2024-02-12T22:08:32.446553003Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 22:08:32.446622 env[1477]: time="2024-02-12T22:08:32.446583284Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 22:08:32.446622 env[1477]: time="2024-02-12T22:08:32.446596058Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 22:08:32.446622 env[1477]: time="2024-02-12T22:08:32.446607540Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 22:08:32.446622 env[1477]: time="2024-02-12T22:08:32.446618044Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 22:08:32.446682 env[1477]: time="2024-02-12T22:08:32.446630792Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 22:08:32.446682 env[1477]: time="2024-02-12T22:08:32.446646508Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 22:08:32.446682 env[1477]: time="2024-02-12T22:08:32.446659835Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 22:08:32.446682 env[1477]: time="2024-02-12T22:08:32.446671335Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 22:08:32.446644 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 22:08:32.446773 env[1477]: time="2024-02-12T22:08:32.446682609Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 22:08:32.446773 env[1477]: time="2024-02-12T22:08:32.446753592Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 22:08:32.446775 systemd[1]: Reached target system-config.target. Feb 12 22:08:32.446846 env[1477]: time="2024-02-12T22:08:32.446816563Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 22:08:32.447018 env[1477]: time="2024-02-12T22:08:32.447006699Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 22:08:32.447038 env[1477]: time="2024-02-12T22:08:32.447029183Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447054 env[1477]: time="2024-02-12T22:08:32.447040630Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 22:08:32.447081 env[1477]: time="2024-02-12T22:08:32.447073786Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447101 env[1477]: time="2024-02-12T22:08:32.447085049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447101 env[1477]: time="2024-02-12T22:08:32.447096194Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447133 env[1477]: time="2024-02-12T22:08:32.447106559Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447133 env[1477]: time="2024-02-12T22:08:32.447117236Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447162 env[1477]: time="2024-02-12T22:08:32.447131111Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447162 env[1477]: time="2024-02-12T22:08:32.447142295Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447162 env[1477]: time="2024-02-12T22:08:32.447153490Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447209 env[1477]: time="2024-02-12T22:08:32.447165139Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 22:08:32.447263 env[1477]: time="2024-02-12T22:08:32.447254634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447280 env[1477]: time="2024-02-12T22:08:32.447267823Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447297 env[1477]: time="2024-02-12T22:08:32.447278034Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447297 env[1477]: time="2024-02-12T22:08:32.447287125Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 22:08:32.447329 env[1477]: time="2024-02-12T22:08:32.447299154Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 22:08:32.447329 env[1477]: time="2024-02-12T22:08:32.447308314Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 22:08:32.447329 env[1477]: time="2024-02-12T22:08:32.447323707Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 22:08:32.447373 env[1477]: time="2024-02-12T22:08:32.447354303Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 22:08:32.447570 env[1477]: time="2024-02-12T22:08:32.447525097Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.447584097Z" level=info msg="Connect containerd service" Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.447610531Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.447991744Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.448093910Z" level=info msg="Start subscribing containerd event" Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.448126527Z" level=info msg="Start recovering state" Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.448151707Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.448165131Z" level=info msg="Start event monitor" Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.448178997Z" level=info msg="Start snapshots syncer" Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.448187500Z" level=info msg="Start cni network conf syncer for default" Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.448182763Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.448208959Z" level=info msg="Start streaming server" Feb 12 22:08:32.449349 env[1477]: time="2024-02-12T22:08:32.448235111Z" level=info msg="containerd successfully booted in 0.033765s" Feb 12 22:08:32.453205 tar[1470]: ./vlan Feb 12 22:08:32.454650 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 22:08:32.454770 systemd[1]: Reached target user-config.target. Feb 12 22:08:32.465191 systemd[1]: Started containerd.service. Feb 12 22:08:32.471838 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 22:08:32.475483 tar[1470]: ./portmap Feb 12 22:08:32.496798 tar[1470]: ./host-local Feb 12 22:08:32.502053 locksmithd[1512]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 22:08:32.516059 tar[1470]: ./vrf Feb 12 22:08:32.538839 tar[1470]: ./bridge Feb 12 22:08:32.563700 tar[1470]: ./tuning Feb 12 22:08:32.579483 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 12 22:08:32.590759 tar[1470]: ./firewall Feb 12 22:08:32.596513 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 12 22:08:32.620902 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Feb 12 22:08:32.620938 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 12 22:08:32.620971 extend-filesystems[1444]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 12 22:08:32.620971 extend-filesystems[1444]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 12 22:08:32.620971 extend-filesystems[1444]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 12 22:08:32.692595 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 12 22:08:32.692626 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 12 22:08:32.621343 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 22:08:32.692750 extend-filesystems[1437]: Resized filesystem in /dev/sdb9 Feb 12 22:08:32.700655 tar[1470]: ./host-device Feb 12 22:08:32.700655 tar[1470]: ./sbr Feb 12 22:08:32.700655 tar[1470]: ./loopback Feb 12 22:08:32.700655 tar[1470]: ./dhcp Feb 12 22:08:32.621456 systemd[1]: Finished extend-filesystems.service. Feb 12 22:08:32.700771 tar[1472]: linux-amd64/LICENSE Feb 12 22:08:32.700771 tar[1472]: linux-amd64/README.md Feb 12 22:08:32.631074 systemd-networkd[1314]: enp2s0f1np1: Link UP Feb 12 22:08:32.631077 systemd-networkd[1314]: enp2s0f1np1: Gained carrier Feb 12 22:08:32.678718 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:32.678765 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:32.678824 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:32.678924 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:32.699413 systemd[1]: Finished prepare-critools.service. Feb 12 22:08:32.708864 systemd[1]: Finished prepare-helm.service. Feb 12 22:08:32.750139 tar[1470]: ./ptp Feb 12 22:08:32.772231 tar[1470]: ./ipvlan Feb 12 22:08:32.793578 tar[1470]: ./bandwidth Feb 12 22:08:32.819357 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 22:08:32.833860 sshd_keygen[1463]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 22:08:32.845479 systemd[1]: Finished sshd-keygen.service. Feb 12 22:08:32.853323 systemd[1]: Starting issuegen.service... Feb 12 22:08:32.860787 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 22:08:32.860860 systemd[1]: Finished issuegen.service. Feb 12 22:08:32.868257 systemd[1]: Starting systemd-user-sessions.service... Feb 12 22:08:32.876751 systemd[1]: Finished systemd-user-sessions.service. Feb 12 22:08:32.885210 systemd[1]: Started getty@tty1.service. Feb 12 22:08:32.892132 systemd[1]: Started serial-getty@ttyS1.service. Feb 12 22:08:32.900663 systemd[1]: Reached target getty.target. Feb 12 22:08:32.986721 coreos-metadata[1427]: Feb 12 22:08:32.986 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 12 22:08:33.001102 coreos-metadata[1430]: Feb 12 22:08:33.001 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 12 22:08:33.380800 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:33.957673 systemd-networkd[1314]: bond0: Gained IPv6LL Feb 12 22:08:33.958389 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:35.708671 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 12 22:08:38.010626 login[1538]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 22:08:38.017185 login[1539]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 22:08:38.046218 systemd-logind[1464]: New session 2 of user core. Feb 12 22:08:38.048572 systemd[1]: Created slice user-500.slice. Feb 12 22:08:38.051263 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 22:08:38.061592 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 22:08:38.062298 systemd[1]: Starting user@500.service... Feb 12 22:08:38.064177 (systemd)[1543]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:38.136331 systemd[1543]: Queued start job for default target default.target. Feb 12 22:08:38.136557 systemd[1543]: Reached target paths.target. Feb 12 22:08:38.136568 systemd[1543]: Reached target sockets.target. Feb 12 22:08:38.136576 systemd[1543]: Reached target timers.target. Feb 12 22:08:38.136583 systemd[1543]: Reached target basic.target. Feb 12 22:08:38.136603 systemd[1543]: Reached target default.target. Feb 12 22:08:38.136617 systemd[1543]: Startup finished in 69ms. Feb 12 22:08:38.136661 systemd[1]: Started user@500.service. Feb 12 22:08:38.137185 systemd[1]: Started session-2.scope. Feb 12 22:08:39.011360 login[1538]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 22:08:39.022432 systemd-logind[1464]: New session 1 of user core. Feb 12 22:08:39.024774 systemd[1]: Started session-1.scope. Feb 12 22:08:39.141500 coreos-metadata[1427]: Feb 12 22:08:39.141 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 12 22:08:39.142131 coreos-metadata[1430]: Feb 12 22:08:39.141 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 12 22:08:40.131135 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 12 22:08:40.131773 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 12 22:08:41.141821 coreos-metadata[1430]: Feb 12 22:08:41.141 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 12 22:08:41.142628 coreos-metadata[1427]: Feb 12 22:08:41.141 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 12 22:08:41.167991 coreos-metadata[1430]: Feb 12 22:08:41.167 INFO Fetch successful Feb 12 22:08:41.168089 coreos-metadata[1427]: Feb 12 22:08:41.167 INFO Fetch successful Feb 12 22:08:41.189933 systemd[1]: Finished coreos-metadata.service. Feb 12 22:08:41.190802 systemd[1]: Started packet-phone-home.service. Feb 12 22:08:41.190882 unknown[1427]: wrote ssh authorized keys file for user: core Feb 12 22:08:41.197138 curl[1565]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 12 22:08:41.197288 curl[1565]: Dload Upload Total Spent Left Speed Feb 12 22:08:41.201791 update-ssh-keys[1566]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:08:41.201992 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 22:08:41.202157 systemd[1]: Reached target multi-user.target. Feb 12 22:08:41.202786 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 22:08:41.206783 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 22:08:41.206853 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 22:08:41.207003 systemd[1]: Startup finished in 2.493s (kernel) + 19.525s (initrd) + 15.850s (userspace) = 37.870s. Feb 12 22:08:41.379086 curl[1565]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 12 22:08:41.381544 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 12 22:08:41.753052 systemd[1]: Created slice system-sshd.slice. Feb 12 22:08:41.753644 systemd[1]: Started sshd@0-147.75.49.97:22-139.178.68.195:48282.service. Feb 12 22:08:41.795023 sshd[1569]: Accepted publickey for core from 139.178.68.195 port 48282 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:08:41.796264 sshd[1569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:41.800048 systemd-logind[1464]: New session 3 of user core. Feb 12 22:08:41.801042 systemd[1]: Started session-3.scope. Feb 12 22:08:41.857922 systemd[1]: Started sshd@1-147.75.49.97:22-139.178.68.195:48284.service. Feb 12 22:08:41.887342 sshd[1574]: Accepted publickey for core from 139.178.68.195 port 48284 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:08:41.888045 sshd[1574]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:41.890358 systemd-logind[1464]: New session 4 of user core. Feb 12 22:08:41.890946 systemd[1]: Started session-4.scope. Feb 12 22:08:41.941869 sshd[1574]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:41.943988 systemd[1]: sshd@1-147.75.49.97:22-139.178.68.195:48284.service: Deactivated successfully. Feb 12 22:08:41.944496 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 22:08:41.945070 systemd-logind[1464]: Session 4 logged out. Waiting for processes to exit. Feb 12 22:08:41.945874 systemd[1]: Started sshd@2-147.75.49.97:22-139.178.68.195:48292.service. Feb 12 22:08:41.946483 systemd-logind[1464]: Removed session 4. Feb 12 22:08:41.978312 sshd[1580]: Accepted publickey for core from 139.178.68.195 port 48292 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:08:41.979174 sshd[1580]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:41.982101 systemd-logind[1464]: New session 5 of user core. Feb 12 22:08:41.982785 systemd[1]: Started session-5.scope. Feb 12 22:08:42.035825 sshd[1580]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:42.037403 systemd[1]: sshd@2-147.75.49.97:22-139.178.68.195:48292.service: Deactivated successfully. Feb 12 22:08:42.037702 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 22:08:42.038092 systemd-logind[1464]: Session 5 logged out. Waiting for processes to exit. Feb 12 22:08:42.038581 systemd[1]: Started sshd@3-147.75.49.97:22-139.178.68.195:48300.service. Feb 12 22:08:42.039088 systemd-logind[1464]: Removed session 5. Feb 12 22:08:42.068964 sshd[1586]: Accepted publickey for core from 139.178.68.195 port 48300 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:08:42.069993 sshd[1586]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:42.073362 systemd-logind[1464]: New session 6 of user core. Feb 12 22:08:42.074110 systemd[1]: Started session-6.scope. Feb 12 22:08:42.131204 sshd[1586]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:42.132748 systemd[1]: sshd@3-147.75.49.97:22-139.178.68.195:48300.service: Deactivated successfully. Feb 12 22:08:42.133045 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 22:08:42.133335 systemd-logind[1464]: Session 6 logged out. Waiting for processes to exit. Feb 12 22:08:42.133900 systemd[1]: Started sshd@4-147.75.49.97:22-139.178.68.195:48310.service. Feb 12 22:08:42.134227 systemd-logind[1464]: Removed session 6. Feb 12 22:08:42.164487 sshd[1592]: Accepted publickey for core from 139.178.68.195 port 48310 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:08:42.165434 sshd[1592]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:42.168713 systemd-logind[1464]: New session 7 of user core. Feb 12 22:08:42.169481 systemd[1]: Started session-7.scope. Feb 12 22:08:42.253410 sudo[1595]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 22:08:42.254035 sudo[1595]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:08:42.269929 dbus-daemon[1433]: \xd0mGj\xdbU: received setenforce notice (enforcing=-1093135200) Feb 12 22:08:42.274912 sudo[1595]: pam_unix(sudo:session): session closed for user root Feb 12 22:08:42.279997 sshd[1592]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:42.287107 systemd[1]: sshd@4-147.75.49.97:22-139.178.68.195:48310.service: Deactivated successfully. Feb 12 22:08:42.288842 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 22:08:42.290588 systemd-logind[1464]: Session 7 logged out. Waiting for processes to exit. Feb 12 22:08:42.293396 systemd[1]: Started sshd@5-147.75.49.97:22-139.178.68.195:48312.service. Feb 12 22:08:42.296032 systemd-logind[1464]: Removed session 7. Feb 12 22:08:42.354667 sshd[1599]: Accepted publickey for core from 139.178.68.195 port 48312 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:08:42.356983 sshd[1599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:42.364303 systemd-logind[1464]: New session 8 of user core. Feb 12 22:08:42.365948 systemd[1]: Started session-8.scope. Feb 12 22:08:42.438973 sudo[1603]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 22:08:42.439584 sudo[1603]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:08:42.446684 sudo[1603]: pam_unix(sudo:session): session closed for user root Feb 12 22:08:42.459012 sudo[1602]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 22:08:42.459632 sudo[1602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:08:42.484040 systemd[1]: Stopping audit-rules.service... Feb 12 22:08:42.485000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:08:42.487305 auditctl[1606]: No rules Feb 12 22:08:42.488164 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 22:08:42.488612 systemd[1]: Stopped audit-rules.service. Feb 12 22:08:42.492378 systemd[1]: Starting audit-rules.service... Feb 12 22:08:42.492817 kernel: kauditd_printk_skb: 96 callbacks suppressed Feb 12 22:08:42.492944 kernel: audit: type=1305 audit(1707775722.485:172): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:08:42.485000 audit[1606]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf7ca3650 a2=420 a3=0 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:42.528018 augenrules[1623]: No rules Feb 12 22:08:42.528678 systemd[1]: Finished audit-rules.service. Feb 12 22:08:42.529509 sudo[1602]: pam_unix(sudo:session): session closed for user root Feb 12 22:08:42.533914 systemd[1]: Started sshd@6-147.75.49.97:22-139.178.68.195:48326.service. Feb 12 22:08:42.539907 kernel: audit: type=1300 audit(1707775722.485:172): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf7ca3650 a2=420 a3=0 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:42.539972 kernel: audit: type=1327 audit(1707775722.485:172): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:08:42.485000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:08:42.540274 sshd[1599]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:42.541932 systemd[1]: sshd@5-147.75.49.97:22-139.178.68.195:48312.service: Deactivated successfully. Feb 12 22:08:42.542379 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 22:08:42.542854 systemd-logind[1464]: Session 8 logged out. Waiting for processes to exit. Feb 12 22:08:42.543415 systemd-logind[1464]: Removed session 8. Feb 12 22:08:42.549548 kernel: audit: type=1131 audit(1707775722.487:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.572022 kernel: audit: type=1130 audit(1707775722.527:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.594527 kernel: audit: type=1106 audit(1707775722.528:175): pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.528000 audit[1602]: USER_END pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.596494 sshd[1628]: Accepted publickey for core from 139.178.68.195 port 48326 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:08:42.597135 sshd[1628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:42.599306 systemd-logind[1464]: New session 9 of user core. Feb 12 22:08:42.599764 systemd[1]: Started session-9.scope. Feb 12 22:08:42.528000 audit[1602]: CRED_DISP pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.644007 kernel: audit: type=1104 audit(1707775722.528:176): pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.644031 kernel: audit: type=1130 audit(1707775722.532:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.49.97:22-139.178.68.195:48326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.49.97:22-139.178.68.195:48326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.646719 sudo[1632]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 22:08:42.646827 sudo[1632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:08:42.669344 kernel: audit: type=1106 audit(1707775722.539:178): pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:08:42.539000 audit[1599]: USER_END pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:08:42.539000 audit[1599]: CRED_DISP pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:08:42.727548 kernel: audit: type=1104 audit(1707775722.539:179): pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:08:42.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.49.97:22-139.178.68.195:48312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.594000 audit[1628]: USER_ACCT pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:08:42.595000 audit[1628]: CRED_ACQ pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:08:42.595000 audit[1628]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd95697180 a2=3 a3=0 items=0 ppid=1 pid=1628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:42.595000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:42.600000 audit[1628]: USER_START pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:08:42.600000 audit[1631]: CRED_ACQ pid=1631 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:08:42.645000 audit[1632]: USER_ACCT pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.645000 audit[1632]: CRED_REFR pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:08:42.646000 audit[1632]: USER_START pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:08:47.091669 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 22:08:47.095446 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 22:08:47.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:47.095637 systemd[1]: Reached target network-online.target. Feb 12 22:08:47.096276 systemd[1]: Starting docker.service... Feb 12 22:08:47.114565 env[1654]: time="2024-02-12T22:08:47.114508014Z" level=info msg="Starting up" Feb 12 22:08:47.115217 env[1654]: time="2024-02-12T22:08:47.115177023Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 22:08:47.115217 env[1654]: time="2024-02-12T22:08:47.115187355Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 22:08:47.115217 env[1654]: time="2024-02-12T22:08:47.115198739Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 22:08:47.115217 env[1654]: time="2024-02-12T22:08:47.115204701Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 22:08:47.116417 env[1654]: time="2024-02-12T22:08:47.116401176Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 22:08:47.116417 env[1654]: time="2024-02-12T22:08:47.116413443Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 22:08:47.116487 env[1654]: time="2024-02-12T22:08:47.116424883Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 22:08:47.116487 env[1654]: time="2024-02-12T22:08:47.116432861Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 22:08:47.129850 env[1654]: time="2024-02-12T22:08:47.129820334Z" level=info msg="Loading containers: start." Feb 12 22:08:47.157000 audit[1699]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.157000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc00270b30 a2=0 a3=7ffc00270b1c items=0 ppid=1654 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.157000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 22:08:47.158000 audit[1701]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.158000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdd8496e30 a2=0 a3=7ffdd8496e1c items=0 ppid=1654 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 22:08:47.159000 audit[1703]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.159000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd30eea740 a2=0 a3=7ffd30eea72c items=0 ppid=1654 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 22:08:47.159000 audit[1705]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.159000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc876cf7f0 a2=0 a3=7ffc876cf7dc items=0 ppid=1654 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 22:08:47.161000 audit[1707]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.161000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffca702f390 a2=0 a3=7ffca702f37c items=0 ppid=1654 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.161000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 22:08:47.214000 audit[1712]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.214000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8d65f330 a2=0 a3=7ffe8d65f31c items=0 ppid=1654 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.214000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 22:08:47.225000 audit[1714]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.225000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc67de3fb0 a2=0 a3=7ffc67de3f9c items=0 ppid=1654 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.225000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 22:08:47.231000 audit[1716]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.231000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd38e606f0 a2=0 a3=7ffd38e606dc items=0 ppid=1654 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.231000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 22:08:47.236000 audit[1718]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.236000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcc3045b60 a2=0 a3=7ffcc3045b4c items=0 ppid=1654 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.236000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:08:47.249000 audit[1722]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.249000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcc306afb0 a2=0 a3=7ffcc306af9c items=0 ppid=1654 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.249000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:08:47.252000 audit[1724]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.252000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc85fc74e0 a2=0 a3=7ffc85fc74cc items=0 ppid=1654 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.252000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:08:47.278499 kernel: Initializing XFRM netlink socket Feb 12 22:08:47.333674 env[1654]: time="2024-02-12T22:08:47.333624498Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 22:08:47.334645 systemd-timesyncd[1420]: Network configuration changed, trying to establish connection. Feb 12 22:08:47.348000 audit[1732]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.348000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc31fef880 a2=0 a3=7ffc31fef86c items=0 ppid=1654 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 22:08:47.365000 audit[1735]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.365000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffdf3ec840 a2=0 a3=7fffdf3ec82c items=0 ppid=1654 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.365000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 22:08:47.367000 audit[1738]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.367000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe13803760 a2=0 a3=7ffe1380374c items=0 ppid=1654 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.367000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 22:08:47.368000 audit[1740]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.368000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffff2558900 a2=0 a3=7ffff25588ec items=0 ppid=1654 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.368000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 22:08:47.369000 audit[1742]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.369000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc22177c30 a2=0 a3=7ffc22177c1c items=0 ppid=1654 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.369000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 22:08:47.370000 audit[1744]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.370000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc6987df10 a2=0 a3=7ffc6987defc items=0 ppid=1654 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.370000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 22:08:47.371000 audit[1746]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.371000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffc2bc4810 a2=0 a3=7fffc2bc47fc items=0 ppid=1654 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.371000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 22:08:47.377000 audit[1749]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.377000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdd4d08110 a2=0 a3=7ffdd4d080fc items=0 ppid=1654 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.377000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 22:08:47.378000 audit[1751]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.378000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff32a98d50 a2=0 a3=7fff32a98d3c items=0 ppid=1654 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.378000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 22:08:47.379000 audit[1753]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.379000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc0daac540 a2=0 a3=7ffc0daac52c items=0 ppid=1654 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.379000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 22:08:47.381000 audit[1755]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.381000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff98cc3500 a2=0 a3=7fff98cc34ec items=0 ppid=1654 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.381000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 22:08:47.382679 systemd-networkd[1314]: docker0: Link UP Feb 12 22:08:47.411000 audit[1759]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.411000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1bbf3e50 a2=0 a3=7ffd1bbf3e3c items=0 ppid=1654 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.411000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:08:47.414000 audit[1760]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:08:47.414000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff90ad68b0 a2=0 a3=7fff90ad689c items=0 ppid=1654 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:47.414000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:08:47.416661 env[1654]: time="2024-02-12T22:08:47.416552687Z" level=info msg="Loading containers: done." Feb 12 22:08:47.436719 env[1654]: time="2024-02-12T22:08:47.436675208Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 22:08:47.436790 env[1654]: time="2024-02-12T22:08:47.436758451Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 22:08:47.436815 env[1654]: time="2024-02-12T22:08:47.436800476Z" level=info msg="Daemon has completed initialization" Feb 12 22:08:47.436841 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck240053972-merged.mount: Deactivated successfully. Feb 12 22:08:47.442944 systemd[1]: Started docker.service. Feb 12 22:08:47.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:47.446044 env[1654]: time="2024-02-12T22:08:47.445995075Z" level=info msg="API listen on /run/docker.sock" Feb 12 22:08:47.457277 systemd[1]: Reloading. Feb 12 22:08:47.493663 /usr/lib/systemd/system-generators/torcx-generator[1811]: time="2024-02-12T22:08:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:08:47.493683 /usr/lib/systemd/system-generators/torcx-generator[1811]: time="2024-02-12T22:08:47Z" level=info msg="torcx already run" Feb 12 22:08:47.581656 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:08:47.581668 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:08:47.598318 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:08:47.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.203226 systemd-resolved[1419]: Clock change detected. Flushing caches. Feb 12 22:08:47.240147 kernel: kauditd_printk_skb: 85 callbacks suppressed Feb 12 22:08:47.240163 kernel: audit: type=1400 audit(1707775727.640:215): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.240173 systemd-journald[1259]: Time jumped backwards, rotating. Feb 12 22:08:47.240205 kernel: audit: type=1400 audit(1707775727.640:216): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.203311 systemd-timesyncd[1420]: Contacted time server [2606:82c0:22::e]:123 (2.flatcar.pool.ntp.org). Feb 12 22:08:47.203336 systemd-timesyncd[1420]: Initial clock synchronization to Mon 2024-02-12 22:08:47.203207 UTC. Feb 12 22:08:47.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.346003 kernel: audit: type=1400 audit(1707775727.640:217): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.346024 kernel: audit: type=1400 audit(1707775727.640:218): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.402148 kernel: audit: type=1400 audit(1707775727.640:219): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.459089 kernel: audit: type=1400 audit(1707775727.640:220): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.518010 kernel: audit: type=1400 audit(1707775727.640:221): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.578546 kernel: audit: type=1400 audit(1707775727.640:222): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.640330 kernel: audit: type=1400 audit(1707775727.640:223): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.703132 kernel: audit: type=1400 audit(1707775727.228:224): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.228000 audit: BPF prog-id=37 op=LOAD Feb 12 22:08:47.228000 audit: BPF prog-id=31 op=UNLOAD Feb 12 22:08:47.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.289000 audit: BPF prog-id=38 op=LOAD Feb 12 22:08:47.289000 audit: BPF prog-id=30 op=UNLOAD Feb 12 22:08:47.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.401000 audit: BPF prog-id=39 op=LOAD Feb 12 22:08:47.401000 audit: BPF prog-id=32 op=UNLOAD Feb 12 22:08:47.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.577000 audit: BPF prog-id=40 op=LOAD Feb 12 22:08:47.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.702000 audit: BPF prog-id=41 op=LOAD Feb 12 22:08:47.702000 audit: BPF prog-id=33 op=UNLOAD Feb 12 22:08:47.702000 audit: BPF prog-id=34 op=UNLOAD Feb 12 22:08:47.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit: BPF prog-id=42 op=LOAD Feb 12 22:08:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.765000 audit: BPF prog-id=43 op=LOAD Feb 12 22:08:47.765000 audit: BPF prog-id=24 op=UNLOAD Feb 12 22:08:47.765000 audit: BPF prog-id=25 op=UNLOAD Feb 12 22:08:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.766000 audit: BPF prog-id=44 op=LOAD Feb 12 22:08:47.766000 audit: BPF prog-id=26 op=UNLOAD Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit: BPF prog-id=45 op=LOAD Feb 12 22:08:47.767000 audit: BPF prog-id=27 op=UNLOAD Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit: BPF prog-id=46 op=LOAD Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit: BPF prog-id=47 op=LOAD Feb 12 22:08:47.768000 audit: BPF prog-id=28 op=UNLOAD Feb 12 22:08:47.768000 audit: BPF prog-id=29 op=UNLOAD Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.768000 audit: BPF prog-id=48 op=LOAD Feb 12 22:08:47.768000 audit: BPF prog-id=35 op=UNLOAD Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit: BPF prog-id=49 op=LOAD Feb 12 22:08:47.769000 audit: BPF prog-id=21 op=UNLOAD Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit: BPF prog-id=50 op=LOAD Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:08:47.769000 audit: BPF prog-id=51 op=LOAD Feb 12 22:08:47.769000 audit: BPF prog-id=22 op=UNLOAD Feb 12 22:08:47.769000 audit: BPF prog-id=23 op=UNLOAD Feb 12 22:08:47.775013 systemd[1]: Started kubelet.service. Feb 12 22:08:47.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:47.799118 kubelet[1870]: E0212 22:08:47.799016 1870 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:08:47.800385 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:08:47.800483 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:08:47.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:08:48.670108 env[1477]: time="2024-02-12T22:08:48.669948067Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 12 22:08:49.329491 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4012868720.mount: Deactivated successfully. Feb 12 22:08:50.653498 env[1477]: time="2024-02-12T22:08:50.653439242Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:50.654164 env[1477]: time="2024-02-12T22:08:50.654106101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:50.655192 env[1477]: time="2024-02-12T22:08:50.655147247Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:50.656164 env[1477]: time="2024-02-12T22:08:50.656117685Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:50.657032 env[1477]: time="2024-02-12T22:08:50.656941018Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 12 22:08:50.663784 env[1477]: time="2024-02-12T22:08:50.663762714Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 12 22:08:52.184812 env[1477]: time="2024-02-12T22:08:52.184743725Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:52.185434 env[1477]: time="2024-02-12T22:08:52.185388313Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:52.186626 env[1477]: time="2024-02-12T22:08:52.186586663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:52.187463 env[1477]: time="2024-02-12T22:08:52.187405604Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:52.187949 env[1477]: time="2024-02-12T22:08:52.187902968Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 12 22:08:52.196722 env[1477]: time="2024-02-12T22:08:52.196690776Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 12 22:08:53.244653 env[1477]: time="2024-02-12T22:08:53.244596068Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:53.245130 env[1477]: time="2024-02-12T22:08:53.245118804Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:53.246915 env[1477]: time="2024-02-12T22:08:53.246902412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:53.247868 env[1477]: time="2024-02-12T22:08:53.247854801Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:53.248698 env[1477]: time="2024-02-12T22:08:53.248659346Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 12 22:08:53.254398 env[1477]: time="2024-02-12T22:08:53.254370373Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 22:08:54.144135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2693655397.mount: Deactivated successfully. Feb 12 22:08:54.433260 env[1477]: time="2024-02-12T22:08:54.433209736Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:54.433893 env[1477]: time="2024-02-12T22:08:54.433878896Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:54.434570 env[1477]: time="2024-02-12T22:08:54.434542723Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:54.435370 env[1477]: time="2024-02-12T22:08:54.435341896Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:54.435914 env[1477]: time="2024-02-12T22:08:54.435901449Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 22:08:54.441386 env[1477]: time="2024-02-12T22:08:54.441370534Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 22:08:54.951690 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1932347672.mount: Deactivated successfully. Feb 12 22:08:54.953085 env[1477]: time="2024-02-12T22:08:54.953038831Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:54.953610 env[1477]: time="2024-02-12T22:08:54.953567921Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:54.954241 env[1477]: time="2024-02-12T22:08:54.954201126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:54.954903 env[1477]: time="2024-02-12T22:08:54.954862950Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:54.955208 env[1477]: time="2024-02-12T22:08:54.955165018Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 22:08:54.960296 env[1477]: time="2024-02-12T22:08:54.960275527Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 12 22:08:55.611434 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1228868819.mount: Deactivated successfully. Feb 12 22:08:57.986270 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 22:08:57.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:57.986399 systemd[1]: Stopped kubelet.service. Feb 12 22:08:57.987334 systemd[1]: Started kubelet.service. Feb 12 22:08:58.010754 kubelet[1961]: E0212 22:08:58.010672 1961 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:08:58.012823 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:08:58.012912 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:08:58.013728 kernel: kauditd_printk_skb: 164 callbacks suppressed Feb 12 22:08:58.013751 kernel: audit: type=1130 audit(1707775737.985:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:57.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:58.141710 kernel: audit: type=1131 audit(1707775737.985:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:58.141737 kernel: audit: type=1130 audit(1707775737.986:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:57.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:58.205560 kernel: audit: type=1131 audit(1707775738.012:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:08:58.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:08:58.507789 env[1477]: time="2024-02-12T22:08:58.507746610Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:58.508710 env[1477]: time="2024-02-12T22:08:58.508697722Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:58.509874 env[1477]: time="2024-02-12T22:08:58.509863093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:58.510758 env[1477]: time="2024-02-12T22:08:58.510748288Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:58.511204 env[1477]: time="2024-02-12T22:08:58.511162637Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 12 22:08:58.517758 env[1477]: time="2024-02-12T22:08:58.517739800Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 12 22:08:59.095321 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3747476134.mount: Deactivated successfully. Feb 12 22:08:59.535868 env[1477]: time="2024-02-12T22:08:59.535810180Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:59.536554 env[1477]: time="2024-02-12T22:08:59.536495047Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:59.537330 env[1477]: time="2024-02-12T22:08:59.537276233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:59.538633 env[1477]: time="2024-02-12T22:08:59.538562782Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:08:59.538915 env[1477]: time="2024-02-12T22:08:59.538861168Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 12 22:09:01.247822 systemd[1]: Stopped kubelet.service. Feb 12 22:09:01.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:01.257845 systemd[1]: Reloading. Feb 12 22:09:01.291894 /usr/lib/systemd/system-generators/torcx-generator[2110]: time="2024-02-12T22:09:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:09:01.291969 /usr/lib/systemd/system-generators/torcx-generator[2110]: time="2024-02-12T22:09:01Z" level=info msg="torcx already run" Feb 12 22:09:01.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:01.313995 kernel: audit: type=1130 audit(1707775741.247:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:01.314043 kernel: audit: type=1131 audit(1707775741.247:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:01.398649 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:09:01.398656 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:09:01.410823 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:09:01.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.580997 kernel: audit: type=1400 audit(1707775741.453:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.581038 kernel: audit: type=1400 audit(1707775741.453:396): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.581049 kernel: audit: type=1400 audit(1707775741.453:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.644782 kernel: audit: type=1400 audit(1707775741.453:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.643000 audit: BPF prog-id=52 op=LOAD Feb 12 22:09:01.643000 audit: BPF prog-id=37 op=UNLOAD Feb 12 22:09:01.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.707000 audit: BPF prog-id=53 op=LOAD Feb 12 22:09:01.707000 audit: BPF prog-id=38 op=UNLOAD Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit: BPF prog-id=54 op=LOAD Feb 12 22:09:01.708000 audit: BPF prog-id=39 op=UNLOAD Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit: BPF prog-id=55 op=LOAD Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.708000 audit: BPF prog-id=56 op=LOAD Feb 12 22:09:01.708000 audit: BPF prog-id=40 op=UNLOAD Feb 12 22:09:01.708000 audit: BPF prog-id=41 op=UNLOAD Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit: BPF prog-id=57 op=LOAD Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit: BPF prog-id=58 op=LOAD Feb 12 22:09:01.709000 audit: BPF prog-id=42 op=UNLOAD Feb 12 22:09:01.709000 audit: BPF prog-id=43 op=UNLOAD Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.710000 audit: BPF prog-id=59 op=LOAD Feb 12 22:09:01.710000 audit: BPF prog-id=44 op=UNLOAD Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit: BPF prog-id=60 op=LOAD Feb 12 22:09:01.711000 audit: BPF prog-id=45 op=UNLOAD Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit: BPF prog-id=61 op=LOAD Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.711000 audit: BPF prog-id=62 op=LOAD Feb 12 22:09:01.711000 audit: BPF prog-id=46 op=UNLOAD Feb 12 22:09:01.711000 audit: BPF prog-id=47 op=UNLOAD Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit: BPF prog-id=63 op=LOAD Feb 12 22:09:01.712000 audit: BPF prog-id=48 op=UNLOAD Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit: BPF prog-id=64 op=LOAD Feb 12 22:09:01.713000 audit: BPF prog-id=49 op=UNLOAD Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit: BPF prog-id=65 op=LOAD Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.713000 audit: BPF prog-id=66 op=LOAD Feb 12 22:09:01.713000 audit: BPF prog-id=50 op=UNLOAD Feb 12 22:09:01.713000 audit: BPF prog-id=51 op=UNLOAD Feb 12 22:09:01.720726 systemd[1]: Started kubelet.service. Feb 12 22:09:01.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:01.743936 kubelet[2170]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:09:01.743936 kubelet[2170]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:09:01.744126 kubelet[2170]: I0212 22:09:01.743940 2170 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:09:01.744678 kubelet[2170]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:09:01.744678 kubelet[2170]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:09:01.926820 kubelet[2170]: I0212 22:09:01.926789 2170 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 22:09:01.926820 kubelet[2170]: I0212 22:09:01.926799 2170 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:09:01.926928 kubelet[2170]: I0212 22:09:01.926917 2170 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 22:09:01.928807 kubelet[2170]: I0212 22:09:01.928795 2170 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:09:01.929348 kubelet[2170]: E0212 22:09:01.929299 2170 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.75.49.97:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:01.952724 kubelet[2170]: I0212 22:09:01.952717 2170 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:09:01.952834 kubelet[2170]: I0212 22:09:01.952825 2170 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:09:01.952895 kubelet[2170]: I0212 22:09:01.952889 2170 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 22:09:01.953043 kubelet[2170]: I0212 22:09:01.952905 2170 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 22:09:01.953043 kubelet[2170]: I0212 22:09:01.952914 2170 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 22:09:01.953096 kubelet[2170]: I0212 22:09:01.953043 2170 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:09:01.954479 kubelet[2170]: I0212 22:09:01.954472 2170 kubelet.go:398] "Attempting to sync node with API server" Feb 12 22:09:01.954508 kubelet[2170]: I0212 22:09:01.954482 2170 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:09:01.954508 kubelet[2170]: I0212 22:09:01.954494 2170 kubelet.go:297] "Adding apiserver pod source" Feb 12 22:09:01.954508 kubelet[2170]: I0212 22:09:01.954501 2170 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:09:01.954815 kubelet[2170]: W0212 22:09:01.954797 2170 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://147.75.49.97:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:01.954841 kubelet[2170]: E0212 22:09:01.954820 2170 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.49.97:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:01.954841 kubelet[2170]: W0212 22:09:01.954825 2170 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://147.75.49.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-0de130baf6&limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:01.954873 kubelet[2170]: I0212 22:09:01.954844 2170 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:09:01.954873 kubelet[2170]: E0212 22:09:01.954849 2170 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.49.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-0de130baf6&limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:01.955044 kubelet[2170]: W0212 22:09:01.955020 2170 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 22:09:01.955303 kubelet[2170]: I0212 22:09:01.955272 2170 server.go:1186] "Started kubelet" Feb 12 22:09:01.955332 kubelet[2170]: I0212 22:09:01.955313 2170 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:09:01.955543 kubelet[2170]: E0212 22:09:01.955533 2170 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:09:01.955571 kubelet[2170]: E0212 22:09:01.955549 2170 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:09:01.955599 kubelet[2170]: E0212 22:09:01.955532 2170 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-0de130baf6.17b33cfd3745ca84", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-0de130baf6", UID:"ci-3510.3.2-a-0de130baf6", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-0de130baf6"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 9, 1, 955263108, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 9, 1, 955263108, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://147.75.49.97:6443/api/v1/namespaces/default/events": dial tcp 147.75.49.97:6443: connect: connection refused'(may retry after sleeping) Feb 12 22:09:01.954000 audit[2170]: AVC avc: denied { mac_admin } for pid=2170 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.954000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:09:01.954000 audit[2170]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010ac1e0 a1=c0010a4450 a2=c0010ac1b0 a3=25 items=0 ppid=1 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.954000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:09:01.955000 audit[2170]: AVC avc: denied { mac_admin } for pid=2170 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:01.955000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:09:01.955000 audit[2170]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00008dca0 a1=c0010a4468 a2=c0010ac270 a3=25 items=0 ppid=1 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.955000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:09:01.956228 kubelet[2170]: I0212 22:09:01.955930 2170 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:09:01.956228 kubelet[2170]: I0212 22:09:01.955966 2170 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:09:01.956228 kubelet[2170]: I0212 22:09:01.956018 2170 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:09:01.956228 kubelet[2170]: I0212 22:09:01.956117 2170 server.go:451] "Adding debug handlers to kubelet server" Feb 12 22:09:01.956317 kubelet[2170]: E0212 22:09:01.956280 2170 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-0de130baf6\" not found" Feb 12 22:09:01.956337 kubelet[2170]: I0212 22:09:01.956315 2170 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 22:09:01.956337 kubelet[2170]: I0212 22:09:01.956333 2170 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:09:01.956487 kubelet[2170]: E0212 22:09:01.956470 2170 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://147.75.49.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-0de130baf6?timeout=10s": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:01.956856 kubelet[2170]: W0212 22:09:01.956630 2170 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://147.75.49.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:01.956894 kubelet[2170]: E0212 22:09:01.956871 2170 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.49.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:01.956000 audit[2194]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.956000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdf077e260 a2=0 a3=7ffdf077e24c items=0 ppid=2170 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:09:01.957000 audit[2195]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.957000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6a8015c0 a2=0 a3=7ffc6a8015ac items=0 ppid=2170 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.957000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:09:01.958000 audit[2197]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.958000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe62d122c0 a2=0 a3=7ffe62d122ac items=0 ppid=2170 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:09:01.959000 audit[2199]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.959000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6891f2b0 a2=0 a3=7ffc6891f29c items=0 ppid=2170 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:09:01.962000 audit[2203]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.962000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc5cbcd7a0 a2=0 a3=7ffc5cbcd78c items=0 ppid=2170 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 22:09:01.962000 audit[2204]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.962000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe18d01d70 a2=0 a3=7ffe18d01d5c items=0 ppid=2170 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 22:09:01.965000 audit[2208]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.965000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffecf7a6930 a2=0 a3=7ffecf7a691c items=0 ppid=2170 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 22:09:01.967000 audit[2211]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.967000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffdd76bfc30 a2=0 a3=7ffdd76bfc1c items=0 ppid=2170 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 22:09:01.967000 audit[2212]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.967000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd4434e5a0 a2=0 a3=7ffd4434e58c items=0 ppid=2170 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 22:09:01.968000 audit[2213]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.968000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde7f14bc0 a2=0 a3=7ffde7f14bac items=0 ppid=2170 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:09:01.969000 audit[2215]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.969000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcb11ab990 a2=0 a3=7ffcb11ab97c items=0 ppid=2170 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 22:09:01.970000 audit[2217]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.970000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdd5ba0270 a2=0 a3=7ffdd5ba025c items=0 ppid=2170 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:09:01.971000 audit[2219]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.971000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc683290a0 a2=0 a3=7ffc6832908c items=0 ppid=2170 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 22:09:01.972000 audit[2221]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.972000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe468ad670 a2=0 a3=7ffe468ad65c items=0 ppid=2170 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 22:09:01.973000 audit[2223]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.973000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffd31a34250 a2=0 a3=7ffd31a3423c items=0 ppid=2170 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 22:09:01.974972 kubelet[2170]: I0212 22:09:01.974938 2170 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 22:09:01.974000 audit[2224]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.974000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdfc70a1a0 a2=0 a3=7ffdfc70a18c items=0 ppid=2170 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:09:01.974000 audit[2225]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.974000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe295e4680 a2=0 a3=7ffe295e466c items=0 ppid=2170 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:09:01.974000 audit[2226]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.974000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc54df28b0 a2=0 a3=7ffc54df289c items=0 ppid=2170 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 22:09:01.975000 audit[2227]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.975000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc119ed670 a2=0 a3=7ffc119ed65c items=0 ppid=2170 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:09:01.975000 audit[2229]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:01.975000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf64b6a90 a2=0 a3=7ffcf64b6a7c items=0 ppid=2170 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:09:01.975000 audit[2230]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.975000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdd6747470 a2=0 a3=7ffdd674745c items=0 ppid=2170 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.975000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 22:09:01.976000 audit[2231]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.976000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe1b7cc910 a2=0 a3=7ffe1b7cc8fc items=0 ppid=2170 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:09:01.977000 audit[2233]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.977000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd8e4cdad0 a2=0 a3=7ffd8e4cdabc items=0 ppid=2170 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 22:09:01.977000 audit[2234]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.977000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd0e4d2e70 a2=0 a3=7ffd0e4d2e5c items=0 ppid=2170 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 22:09:01.978000 audit[2235]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.978000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe95582810 a2=0 a3=7ffe955827fc items=0 ppid=2170 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:09:01.979000 audit[2237]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.979000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe64d7da00 a2=0 a3=7ffe64d7d9ec items=0 ppid=2170 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 22:09:01.980000 audit[2239]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.980000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffedcad7eb0 a2=0 a3=7ffedcad7e9c items=0 ppid=2170 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:09:01.981000 audit[2241]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.981000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffff8905750 a2=0 a3=7ffff890573c items=0 ppid=2170 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 22:09:01.982000 audit[2243]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.982000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd12b42a20 a2=0 a3=7ffd12b42a0c items=0 ppid=2170 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.982000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 22:09:01.984000 audit[2245]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.984000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffede2953b0 a2=0 a3=7ffede29539c items=0 ppid=2170 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 22:09:01.986102 kubelet[2170]: I0212 22:09:01.986074 2170 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 22:09:01.986102 kubelet[2170]: I0212 22:09:01.986086 2170 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 22:09:01.986102 kubelet[2170]: I0212 22:09:01.986098 2170 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 22:09:01.986160 kubelet[2170]: E0212 22:09:01.986132 2170 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 22:09:01.986416 kubelet[2170]: W0212 22:09:01.986360 2170 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://147.75.49.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:01.986416 kubelet[2170]: E0212 22:09:01.986390 2170 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.49.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:01.985000 audit[2246]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.985000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca7f5b9a0 a2=0 a3=7ffca7f5b98c items=0 ppid=2170 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:09:01.986000 audit[2247]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.986000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff84568640 a2=0 a3=7fff8456862c items=0 ppid=2170 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:09:01.986000 audit[2248]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:01.986000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff442b4970 a2=0 a3=7fff442b495c items=0 ppid=2170 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:01.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:09:02.087181 kubelet[2170]: E0212 22:09:02.087076 2170 kubelet.go:2137] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 12 22:09:02.134964 kubelet[2170]: I0212 22:09:02.134864 2170 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.135675 kubelet[2170]: E0212 22:09:02.135609 2170 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.49.97:6443/api/v1/nodes\": dial tcp 147.75.49.97:6443: connect: connection refused" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.136061 kubelet[2170]: I0212 22:09:02.135980 2170 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:09:02.136061 kubelet[2170]: I0212 22:09:02.136027 2170 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:09:02.136061 kubelet[2170]: I0212 22:09:02.136062 2170 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:09:02.138014 kubelet[2170]: I0212 22:09:02.137966 2170 policy_none.go:49] "None policy: Start" Feb 12 22:09:02.139085 kubelet[2170]: I0212 22:09:02.139006 2170 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:09:02.139085 kubelet[2170]: I0212 22:09:02.139055 2170 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:09:02.148662 systemd[1]: Created slice kubepods.slice. Feb 12 22:09:02.157401 kubelet[2170]: E0212 22:09:02.157292 2170 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://147.75.49.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-0de130baf6?timeout=10s": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:02.158562 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 22:09:02.165854 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 22:09:02.177000 audit[2170]: AVC avc: denied { mac_admin } for pid=2170 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:02.177000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:09:02.177000 audit[2170]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ae1020 a1=c00067b308 a2=c000ae0ff0 a3=25 items=0 ppid=1 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:02.177000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:09:02.179341 kubelet[2170]: I0212 22:09:02.178432 2170 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:09:02.179341 kubelet[2170]: I0212 22:09:02.178550 2170 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:09:02.179341 kubelet[2170]: I0212 22:09:02.178875 2170 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:09:02.179777 kubelet[2170]: E0212 22:09:02.179711 2170 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-0de130baf6\" not found" Feb 12 22:09:02.287835 kubelet[2170]: I0212 22:09:02.287725 2170 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:02.291950 kubelet[2170]: I0212 22:09:02.291868 2170 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:02.297157 kubelet[2170]: I0212 22:09:02.297114 2170 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:02.297675 kubelet[2170]: I0212 22:09:02.297639 2170 status_manager.go:698] "Failed to get status for pod" podUID=9b897f1e79211145e72ae3e4c2ca36c8 pod="kube-system/kube-apiserver-ci-3510.3.2-a-0de130baf6" err="Get \"https://147.75.49.97:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-a-0de130baf6\": dial tcp 147.75.49.97:6443: connect: connection refused" Feb 12 22:09:02.300794 kubelet[2170]: I0212 22:09:02.300745 2170 status_manager.go:698] "Failed to get status for pod" podUID=12dd90e1639897c20f405b30e737ba0e pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" err="Get \"https://147.75.49.97:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-a-0de130baf6\": dial tcp 147.75.49.97:6443: connect: connection refused" Feb 12 22:09:02.304242 kubelet[2170]: I0212 22:09:02.304200 2170 status_manager.go:698] "Failed to get status for pod" podUID=8940bf58c6a186d67bf99e45d453d7d8 pod="kube-system/kube-scheduler-ci-3510.3.2-a-0de130baf6" err="Get \"https://147.75.49.97:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-a-0de130baf6\": dial tcp 147.75.49.97:6443: connect: connection refused" Feb 12 22:09:02.308730 systemd[1]: Created slice kubepods-burstable-pod9b897f1e79211145e72ae3e4c2ca36c8.slice. Feb 12 22:09:02.339414 kubelet[2170]: I0212 22:09:02.339367 2170 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.340034 kubelet[2170]: E0212 22:09:02.340002 2170 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.49.97:6443/api/v1/nodes\": dial tcp 147.75.49.97:6443: connect: connection refused" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.343973 systemd[1]: Created slice kubepods-burstable-pod12dd90e1639897c20f405b30e737ba0e.slice. Feb 12 22:09:02.351621 systemd[1]: Created slice kubepods-burstable-pod8940bf58c6a186d67bf99e45d453d7d8.slice. Feb 12 22:09:02.358026 kubelet[2170]: I0212 22:09:02.357961 2170 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8940bf58c6a186d67bf99e45d453d7d8-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-0de130baf6\" (UID: \"8940bf58c6a186d67bf99e45d453d7d8\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.358192 kubelet[2170]: I0212 22:09:02.358079 2170 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9b897f1e79211145e72ae3e4c2ca36c8-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-0de130baf6\" (UID: \"9b897f1e79211145e72ae3e4c2ca36c8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.358192 kubelet[2170]: I0212 22:09:02.358159 2170 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9b897f1e79211145e72ae3e4c2ca36c8-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-0de130baf6\" (UID: \"9b897f1e79211145e72ae3e4c2ca36c8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.358398 kubelet[2170]: I0212 22:09:02.358278 2170 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9b897f1e79211145e72ae3e4c2ca36c8-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-0de130baf6\" (UID: \"9b897f1e79211145e72ae3e4c2ca36c8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.358398 kubelet[2170]: I0212 22:09:02.358392 2170 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/12dd90e1639897c20f405b30e737ba0e-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" (UID: \"12dd90e1639897c20f405b30e737ba0e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.358576 kubelet[2170]: I0212 22:09:02.358489 2170 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/12dd90e1639897c20f405b30e737ba0e-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" (UID: \"12dd90e1639897c20f405b30e737ba0e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.358576 kubelet[2170]: I0212 22:09:02.358557 2170 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/12dd90e1639897c20f405b30e737ba0e-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" (UID: \"12dd90e1639897c20f405b30e737ba0e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.358753 kubelet[2170]: I0212 22:09:02.358640 2170 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/12dd90e1639897c20f405b30e737ba0e-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" (UID: \"12dd90e1639897c20f405b30e737ba0e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.358753 kubelet[2170]: I0212 22:09:02.358717 2170 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/12dd90e1639897c20f405b30e737ba0e-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" (UID: \"12dd90e1639897c20f405b30e737ba0e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.558272 kubelet[2170]: E0212 22:09:02.558174 2170 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://147.75.49.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-0de130baf6?timeout=10s": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:02.638305 env[1477]: time="2024-02-12T22:09:02.638156450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-0de130baf6,Uid:9b897f1e79211145e72ae3e4c2ca36c8,Namespace:kube-system,Attempt:0,}" Feb 12 22:09:02.649557 env[1477]: time="2024-02-12T22:09:02.649417396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-0de130baf6,Uid:12dd90e1639897c20f405b30e737ba0e,Namespace:kube-system,Attempt:0,}" Feb 12 22:09:02.656438 env[1477]: time="2024-02-12T22:09:02.656326545Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-0de130baf6,Uid:8940bf58c6a186d67bf99e45d453d7d8,Namespace:kube-system,Attempt:0,}" Feb 12 22:09:02.744204 kubelet[2170]: I0212 22:09:02.744118 2170 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:02.744981 kubelet[2170]: E0212 22:09:02.744746 2170 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.49.97:6443/api/v1/nodes\": dial tcp 147.75.49.97:6443: connect: connection refused" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:03.027974 kubelet[2170]: W0212 22:09:03.027810 2170 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://147.75.49.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-0de130baf6&limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:03.027974 kubelet[2170]: E0212 22:09:03.027952 2170 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.49.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-0de130baf6&limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:03.065310 kubelet[2170]: W0212 22:09:03.065140 2170 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://147.75.49.97:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:03.065310 kubelet[2170]: E0212 22:09:03.065288 2170 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.49.97:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:03.186426 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2801942788.mount: Deactivated successfully. Feb 12 22:09:03.187941 env[1477]: time="2024-02-12T22:09:03.187917650Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.188977 env[1477]: time="2024-02-12T22:09:03.188941412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.189543 env[1477]: time="2024-02-12T22:09:03.189530394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.190172 env[1477]: time="2024-02-12T22:09:03.190158443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.190542 env[1477]: time="2024-02-12T22:09:03.190530909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.191668 env[1477]: time="2024-02-12T22:09:03.191657561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.193300 env[1477]: time="2024-02-12T22:09:03.193260895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.194572 env[1477]: time="2024-02-12T22:09:03.194528632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.195356 env[1477]: time="2024-02-12T22:09:03.195344637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.195741 env[1477]: time="2024-02-12T22:09:03.195729771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.196324 env[1477]: time="2024-02-12T22:09:03.196309728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.196780 env[1477]: time="2024-02-12T22:09:03.196765542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:03.201158 env[1477]: time="2024-02-12T22:09:03.201121193Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:09:03.201158 env[1477]: time="2024-02-12T22:09:03.201141400Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:09:03.201158 env[1477]: time="2024-02-12T22:09:03.201152980Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:09:03.201290 env[1477]: time="2024-02-12T22:09:03.201244409Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/094798570b16bbb39757b4af712e01cad1b285761534038ba63cc019eadceae5 pid=2264 runtime=io.containerd.runc.v2 Feb 12 22:09:03.201290 env[1477]: time="2024-02-12T22:09:03.201258221Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:09:03.201290 env[1477]: time="2024-02-12T22:09:03.201279276Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:09:03.201356 env[1477]: time="2024-02-12T22:09:03.201286794Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:09:03.201378 env[1477]: time="2024-02-12T22:09:03.201348995Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/247c5cfba11d2d69757bab77311aa1b1fea916ba0190889c15e54d60ede68dd1 pid=2265 runtime=io.containerd.runc.v2 Feb 12 22:09:03.203143 env[1477]: time="2024-02-12T22:09:03.203105194Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:09:03.203143 env[1477]: time="2024-02-12T22:09:03.203129411Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:09:03.203143 env[1477]: time="2024-02-12T22:09:03.203136963Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:09:03.203264 env[1477]: time="2024-02-12T22:09:03.203242167Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/18648ee5ce871e3a18ab4ff4d45ad361bfa6ccc543d2f1e47e92f6608e6457e0 pid=2292 runtime=io.containerd.runc.v2 Feb 12 22:09:03.208044 systemd[1]: Started cri-containerd-094798570b16bbb39757b4af712e01cad1b285761534038ba63cc019eadceae5.scope. Feb 12 22:09:03.208786 systemd[1]: Started cri-containerd-247c5cfba11d2d69757bab77311aa1b1fea916ba0190889c15e54d60ede68dd1.scope. Feb 12 22:09:03.210599 systemd[1]: Started cri-containerd-18648ee5ce871e3a18ab4ff4d45ad361bfa6ccc543d2f1e47e92f6608e6457e0.scope. Feb 12 22:09:03.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.240818 kernel: kauditd_printk_skb: 280 callbacks suppressed Feb 12 22:09:03.240876 kernel: audit: type=1400 audit(1707775743.213:604): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.293749 kubelet[2170]: W0212 22:09:03.293676 2170 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://147.75.49.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:03.293749 kubelet[2170]: E0212 22:09:03.293709 2170 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.49.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:03.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.304968 kernel: audit: type=1400 audit(1707775743.213:605): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.359445 kubelet[2170]: E0212 22:09:03.359406 2170 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://147.75.49.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-0de130baf6?timeout=10s": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:03.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.431215 kernel: audit: type=1400 audit(1707775743.213:606): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.431243 kernel: audit: type=1400 audit(1707775743.213:607): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.495561 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:09:03.495597 kernel: audit: type=1400 audit(1707775743.213:608): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.522929 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:09:03.522972 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 22:09:03.523002 kernel: audit: backlog limit exceeded Feb 12 22:09:03.523027 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 22:09:03.545966 kubelet[2170]: I0212 22:09:03.545906 2170 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:03.546048 kubelet[2170]: E0212 22:09:03.546037 2170 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.49.97:6443/api/v1/nodes\": dial tcp 147.75.49.97:6443: connect: connection refused" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:03.553264 kubelet[2170]: W0212 22:09:03.553234 2170 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://147.75.49.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:03.553264 kubelet[2170]: E0212 22:09:03.553258 2170 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.49.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.49.97:6443: connect: connection refused Feb 12 22:09:03.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit: BPF prog-id=67 op=LOAD Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2264 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343739383537306231366262623339373537623461663731326530 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2264 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343739383537306231366262623339373537623461663731326530 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.303000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit: BPF prog-id=68 op=LOAD Feb 12 22:09:03.303000 audit: BPF prog-id=69 op=LOAD Feb 12 22:09:03.303000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000259ce0 items=0 ppid=2264 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343739383537306231366262623339373537623461663731326530 Feb 12 22:09:03.430000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2265 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376335636662613131643264363937353762616237373331316161 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2265 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376335636662613131643264363937353762616237373331316161 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.430000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000259d28 items=0 ppid=2264 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343739383537306231366262623339373537623461663731326530 Feb 12 22:09:03.586000 audit: BPF prog-id=70 op=UNLOAD Feb 12 22:09:03.430000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000335d10 items=0 ppid=2265 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376335636662613131643264363937353762616237373331316161 Feb 12 22:09:03.586000 audit: BPF prog-id=69 op=UNLOAD Feb 12 22:09:03.586000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit: BPF prog-id=72 op=LOAD Feb 12 22:09:03.586000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000335d58 items=0 ppid=2265 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376335636662613131643264363937353762616237373331316161 Feb 12 22:09:03.641000 audit: BPF prog-id=72 op=UNLOAD Feb 12 22:09:03.641000 audit: BPF prog-id=71 op=UNLOAD Feb 12 22:09:03.641000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.641000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.641000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.641000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.641000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.641000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.641000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.641000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.641000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.586000 audit: BPF prog-id=73 op=LOAD Feb 12 22:09:03.586000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003da138 items=0 ppid=2264 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343739383537306231366262623339373537623461663731326530 Feb 12 22:09:03.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.641000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.641000 audit: BPF prog-id=74 op=LOAD Feb 12 22:09:03.641000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003b2168 items=0 ppid=2265 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376335636662613131643264363937353762616237373331316161 Feb 12 22:09:03.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.693000 audit: BPF prog-id=75 op=LOAD Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2292 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363438656535636538373165336131386162346666346434356164 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2292 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363438656535636538373165336131386162346666346434356164 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit: BPF prog-id=76 op=LOAD Feb 12 22:09:03.694000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cbdc0 items=0 ppid=2292 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363438656535636538373165336131386162346666346434356164 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit: BPF prog-id=77 op=LOAD Feb 12 22:09:03.694000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002cbe08 items=0 ppid=2292 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363438656535636538373165336131386162346666346434356164 Feb 12 22:09:03.694000 audit: BPF prog-id=77 op=UNLOAD Feb 12 22:09:03.694000 audit: BPF prog-id=76 op=UNLOAD Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.694000 audit: BPF prog-id=78 op=LOAD Feb 12 22:09:03.694000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003be218 items=0 ppid=2292 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363438656535636538373165336131386162346666346434356164 Feb 12 22:09:03.710872 env[1477]: time="2024-02-12T22:09:03.710847698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-0de130baf6,Uid:8940bf58c6a186d67bf99e45d453d7d8,Namespace:kube-system,Attempt:0,} returns sandbox id \"247c5cfba11d2d69757bab77311aa1b1fea916ba0190889c15e54d60ede68dd1\"" Feb 12 22:09:03.711749 env[1477]: time="2024-02-12T22:09:03.711730246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-0de130baf6,Uid:12dd90e1639897c20f405b30e737ba0e,Namespace:kube-system,Attempt:0,} returns sandbox id \"18648ee5ce871e3a18ab4ff4d45ad361bfa6ccc543d2f1e47e92f6608e6457e0\"" Feb 12 22:09:03.711795 env[1477]: time="2024-02-12T22:09:03.711784759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-0de130baf6,Uid:9b897f1e79211145e72ae3e4c2ca36c8,Namespace:kube-system,Attempt:0,} returns sandbox id \"094798570b16bbb39757b4af712e01cad1b285761534038ba63cc019eadceae5\"" Feb 12 22:09:03.712629 env[1477]: time="2024-02-12T22:09:03.712615951Z" level=info msg="CreateContainer within sandbox \"247c5cfba11d2d69757bab77311aa1b1fea916ba0190889c15e54d60ede68dd1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 22:09:03.712779 env[1477]: time="2024-02-12T22:09:03.712764821Z" level=info msg="CreateContainer within sandbox \"18648ee5ce871e3a18ab4ff4d45ad361bfa6ccc543d2f1e47e92f6608e6457e0\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 22:09:03.712884 env[1477]: time="2024-02-12T22:09:03.712772806Z" level=info msg="CreateContainer within sandbox \"094798570b16bbb39757b4af712e01cad1b285761534038ba63cc019eadceae5\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 22:09:03.719209 env[1477]: time="2024-02-12T22:09:03.719167728Z" level=info msg="CreateContainer within sandbox \"247c5cfba11d2d69757bab77311aa1b1fea916ba0190889c15e54d60ede68dd1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"4a9f02c96000ef27a618e082a69ecde727feae8f45ace695bf4d594c57826bbb\"" Feb 12 22:09:03.719482 env[1477]: time="2024-02-12T22:09:03.719430826Z" level=info msg="StartContainer for \"4a9f02c96000ef27a618e082a69ecde727feae8f45ace695bf4d594c57826bbb\"" Feb 12 22:09:03.720960 env[1477]: time="2024-02-12T22:09:03.720906388Z" level=info msg="CreateContainer within sandbox \"094798570b16bbb39757b4af712e01cad1b285761534038ba63cc019eadceae5\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"ee3cc46ba45a6d3741fed3dfba5349a6be87d3e0b8eaa0c734587a82c87ce1ca\"" Feb 12 22:09:03.721107 env[1477]: time="2024-02-12T22:09:03.721067304Z" level=info msg="StartContainer for \"ee3cc46ba45a6d3741fed3dfba5349a6be87d3e0b8eaa0c734587a82c87ce1ca\"" Feb 12 22:09:03.721469 env[1477]: time="2024-02-12T22:09:03.721453115Z" level=info msg="CreateContainer within sandbox \"18648ee5ce871e3a18ab4ff4d45ad361bfa6ccc543d2f1e47e92f6608e6457e0\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6478451d1eac664de35a4581fac2fc021e50257b7cb325bff89ff768d6fffaa9\"" Feb 12 22:09:03.721674 env[1477]: time="2024-02-12T22:09:03.721660345Z" level=info msg="StartContainer for \"6478451d1eac664de35a4581fac2fc021e50257b7cb325bff89ff768d6fffaa9\"" Feb 12 22:09:03.726980 systemd[1]: Started cri-containerd-4a9f02c96000ef27a618e082a69ecde727feae8f45ace695bf4d594c57826bbb.scope. Feb 12 22:09:03.729500 systemd[1]: Started cri-containerd-6478451d1eac664de35a4581fac2fc021e50257b7cb325bff89ff768d6fffaa9.scope. Feb 12 22:09:03.730154 systemd[1]: Started cri-containerd-ee3cc46ba45a6d3741fed3dfba5349a6be87d3e0b8eaa0c734587a82c87ce1ca.scope. Feb 12 22:09:03.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.732000 audit: BPF prog-id=79 op=LOAD Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2265 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461396630326339363030306566323761363138653038326136396563 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2265 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461396630326339363030306566323761363138653038326136396563 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit: BPF prog-id=80 op=LOAD Feb 12 22:09:03.733000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003f0830 items=0 ppid=2265 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461396630326339363030306566323761363138653038326136396563 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit: BPF prog-id=81 op=LOAD Feb 12 22:09:03.733000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003f0878 items=0 ppid=2265 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461396630326339363030306566323761363138653038326136396563 Feb 12 22:09:03.733000 audit: BPF prog-id=81 op=UNLOAD Feb 12 22:09:03.733000 audit: BPF prog-id=80 op=UNLOAD Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.733000 audit: BPF prog-id=82 op=LOAD Feb 12 22:09:03.733000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003f0c88 items=0 ppid=2265 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461396630326339363030306566323761363138653038326136396563 Feb 12 22:09:03.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit: BPF prog-id=83 op=LOAD Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2264 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565336363343662613435613664333734316665643364666261353334 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2264 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565336363343662613435613664333734316665643364666261353334 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit: BPF prog-id=84 op=LOAD Feb 12 22:09:03.734000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000304740 items=0 ppid=2264 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565336363343662613435613664333734316665643364666261353334 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit: BPF prog-id=85 op=LOAD Feb 12 22:09:03.734000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000304788 items=0 ppid=2264 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565336363343662613435613664333734316665643364666261353334 Feb 12 22:09:03.734000 audit: BPF prog-id=85 op=UNLOAD Feb 12 22:09:03.734000 audit: BPF prog-id=84 op=UNLOAD Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.734000 audit: BPF prog-id=86 op=LOAD Feb 12 22:09:03.734000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000304b98 items=0 ppid=2264 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565336363343662613435613664333734316665643364666261353334 Feb 12 22:09:03.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit: BPF prog-id=87 op=LOAD Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2292 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373834353164316561633636346465333561343538316661633266 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2292 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373834353164316561633636346465333561343538316661633266 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit: BPF prog-id=88 op=LOAD Feb 12 22:09:03.735000 audit[2399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f3dc0 items=0 ppid=2292 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373834353164316561633636346465333561343538316661633266 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit: BPF prog-id=89 op=LOAD Feb 12 22:09:03.735000 audit[2399]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f3e08 items=0 ppid=2292 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373834353164316561633636346465333561343538316661633266 Feb 12 22:09:03.735000 audit: BPF prog-id=89 op=UNLOAD Feb 12 22:09:03.735000 audit: BPF prog-id=88 op=UNLOAD Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { perfmon } for pid=2399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit[2399]: AVC avc: denied { bpf } for pid=2399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:03.735000 audit: BPF prog-id=90 op=LOAD Feb 12 22:09:03.735000 audit[2399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d2218 items=0 ppid=2292 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:03.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373834353164316561633636346465333561343538316661633266 Feb 12 22:09:03.752170 env[1477]: time="2024-02-12T22:09:03.752142093Z" level=info msg="StartContainer for \"4a9f02c96000ef27a618e082a69ecde727feae8f45ace695bf4d594c57826bbb\" returns successfully" Feb 12 22:09:03.752409 env[1477]: time="2024-02-12T22:09:03.752388203Z" level=info msg="StartContainer for \"ee3cc46ba45a6d3741fed3dfba5349a6be87d3e0b8eaa0c734587a82c87ce1ca\" returns successfully" Feb 12 22:09:03.752529 env[1477]: time="2024-02-12T22:09:03.752515575Z" level=info msg="StartContainer for \"6478451d1eac664de35a4581fac2fc021e50257b7cb325bff89ff768d6fffaa9\" returns successfully" Feb 12 22:09:04.060000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:04.060000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:04.060000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000384aa0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:09:04.060000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000152fc0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:09:04.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:09:04.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:09:04.707000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:04.707000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:04.707000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0025be000 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:09:04.707000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c000f44040 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:09:04.707000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:09:04.707000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:09:04.708000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:04.708000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c002630000 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:09:04.708000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:09:04.709000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:04.709000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0024c0030 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:09:04.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:09:04.709000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:04.709000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c002e3f760 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:09:04.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:09:04.709000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:04.709000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c003868030 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:09:04.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:09:04.967259 kubelet[2170]: E0212 22:09:04.967110 2170 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-0de130baf6\" not found" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:05.150464 kubelet[2170]: I0212 22:09:05.150409 2170 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:05.771427 kubelet[2170]: I0212 22:09:05.771369 2170 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:05.957190 kubelet[2170]: I0212 22:09:05.957136 2170 apiserver.go:52] "Watching apiserver" Feb 12 22:09:06.657243 kubelet[2170]: I0212 22:09:06.657144 2170 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:09:06.690716 kubelet[2170]: I0212 22:09:06.690602 2170 reconciler.go:41] "Reconciler: start to sync state" Feb 12 22:09:07.155277 kubelet[2170]: I0212 22:09:07.155170 2170 request.go:690] Waited for 1.157532413s due to client-side throttling, not priority and fairness, request: POST:https://147.75.49.97:6443/api/v1/namespaces/kube-system/pods Feb 12 22:09:07.315000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=521299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 22:09:07.315000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012861c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:09:07.315000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:09:07.447000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:07.447000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006b32c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:09:07.447000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:09:07.450000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:07.450000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009fc220 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:09:07.450000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:09:07.453000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:07.453000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009fc260 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:09:07.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:09:07.455000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:09:07.455000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089a5a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:09:07.455000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:09:07.901515 systemd[1]: Reloading. Feb 12 22:09:07.961826 /usr/lib/systemd/system-generators/torcx-generator[2537]: time="2024-02-12T22:09:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:09:07.961848 /usr/lib/systemd/system-generators/torcx-generator[2537]: time="2024-02-12T22:09:07Z" level=info msg="torcx already run" Feb 12 22:09:08.033826 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:09:08.033836 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:09:08.048071 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:09:08.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit: BPF prog-id=91 op=LOAD Feb 12 22:09:08.098000 audit: BPF prog-id=67 op=UNLOAD Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit: BPF prog-id=92 op=LOAD Feb 12 22:09:08.098000 audit: BPF prog-id=52 op=UNLOAD Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.098000 audit: BPF prog-id=93 op=LOAD Feb 12 22:09:08.099000 audit: BPF prog-id=53 op=UNLOAD Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit: BPF prog-id=94 op=LOAD Feb 12 22:09:08.099000 audit: BPF prog-id=54 op=UNLOAD Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit: BPF prog-id=95 op=LOAD Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.099000 audit: BPF prog-id=96 op=LOAD Feb 12 22:09:08.099000 audit: BPF prog-id=55 op=UNLOAD Feb 12 22:09:08.099000 audit: BPF prog-id=56 op=UNLOAD Feb 12 22:09:08.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.100000 audit: BPF prog-id=97 op=LOAD Feb 12 22:09:08.100000 audit: BPF prog-id=75 op=UNLOAD Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit: BPF prog-id=98 op=LOAD Feb 12 22:09:08.101000 audit: BPF prog-id=68 op=UNLOAD Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit: BPF prog-id=99 op=LOAD Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.101000 audit: BPF prog-id=100 op=LOAD Feb 12 22:09:08.101000 audit: BPF prog-id=57 op=UNLOAD Feb 12 22:09:08.101000 audit: BPF prog-id=58 op=UNLOAD Feb 12 22:09:08.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.102000 audit: BPF prog-id=101 op=LOAD Feb 12 22:09:08.102000 audit: BPF prog-id=59 op=UNLOAD Feb 12 22:09:08.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.103000 audit: BPF prog-id=102 op=LOAD Feb 12 22:09:08.103000 audit: BPF prog-id=87 op=UNLOAD Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit: BPF prog-id=103 op=LOAD Feb 12 22:09:08.104000 audit: BPF prog-id=60 op=UNLOAD Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit: BPF prog-id=104 op=LOAD Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit: BPF prog-id=105 op=LOAD Feb 12 22:09:08.104000 audit: BPF prog-id=61 op=UNLOAD Feb 12 22:09:08.104000 audit: BPF prog-id=62 op=UNLOAD Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.104000 audit: BPF prog-id=106 op=LOAD Feb 12 22:09:08.105000 audit: BPF prog-id=79 op=UNLOAD Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit: BPF prog-id=107 op=LOAD Feb 12 22:09:08.105000 audit: BPF prog-id=83 op=UNLOAD Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.105000 audit: BPF prog-id=108 op=LOAD Feb 12 22:09:08.105000 audit: BPF prog-id=63 op=UNLOAD Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit: BPF prog-id=109 op=LOAD Feb 12 22:09:08.106000 audit: BPF prog-id=64 op=UNLOAD Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit: BPF prog-id=110 op=LOAD Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.106000 audit: BPF prog-id=111 op=LOAD Feb 12 22:09:08.106000 audit: BPF prog-id=65 op=UNLOAD Feb 12 22:09:08.106000 audit: BPF prog-id=66 op=UNLOAD Feb 12 22:09:08.114418 kubelet[2170]: I0212 22:09:08.114374 2170 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:09:08.114453 systemd[1]: Stopping kubelet.service... Feb 12 22:09:08.141182 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 22:09:08.141288 systemd[1]: Stopped kubelet.service. Feb 12 22:09:08.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:08.142207 systemd[1]: Started kubelet.service. Feb 12 22:09:08.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:08.168519 kubelet[2597]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:09:08.168519 kubelet[2597]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:09:08.168708 kubelet[2597]: I0212 22:09:08.168511 2597 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:09:08.169329 kubelet[2597]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:09:08.169329 kubelet[2597]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:09:08.170967 kubelet[2597]: I0212 22:09:08.170957 2597 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 22:09:08.170967 kubelet[2597]: I0212 22:09:08.170967 2597 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:09:08.171101 kubelet[2597]: I0212 22:09:08.171095 2597 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 22:09:08.171788 kubelet[2597]: I0212 22:09:08.171781 2597 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 22:09:08.172578 kubelet[2597]: I0212 22:09:08.172562 2597 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:09:08.205516 kubelet[2597]: I0212 22:09:08.205433 2597 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:09:08.205884 kubelet[2597]: I0212 22:09:08.205831 2597 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:09:08.206055 kubelet[2597]: I0212 22:09:08.206017 2597 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 22:09:08.206282 kubelet[2597]: I0212 22:09:08.206069 2597 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 22:09:08.206282 kubelet[2597]: I0212 22:09:08.206103 2597 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 22:09:08.206282 kubelet[2597]: I0212 22:09:08.206180 2597 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:09:08.212651 kubelet[2597]: I0212 22:09:08.212567 2597 kubelet.go:398] "Attempting to sync node with API server" Feb 12 22:09:08.212651 kubelet[2597]: I0212 22:09:08.212640 2597 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:09:08.212973 kubelet[2597]: I0212 22:09:08.212692 2597 kubelet.go:297] "Adding apiserver pod source" Feb 12 22:09:08.212973 kubelet[2597]: I0212 22:09:08.212731 2597 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:09:08.214117 kubelet[2597]: I0212 22:09:08.214032 2597 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:09:08.215308 kubelet[2597]: I0212 22:09:08.215231 2597 server.go:1186] "Started kubelet" Feb 12 22:09:08.215496 kubelet[2597]: I0212 22:09:08.215351 2597 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:09:08.216163 kubelet[2597]: E0212 22:09:08.216113 2597 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:09:08.216366 kubelet[2597]: E0212 22:09:08.216183 2597 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:09:08.219000 audit[2597]: AVC avc: denied { mac_admin } for pid=2597 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.221148 kubelet[2597]: I0212 22:09:08.220913 2597 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:09:08.221148 kubelet[2597]: I0212 22:09:08.221016 2597 server.go:451] "Adding debug handlers to kubelet server" Feb 12 22:09:08.221148 kubelet[2597]: I0212 22:09:08.221091 2597 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:09:08.221637 kubelet[2597]: I0212 22:09:08.221149 2597 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:09:08.221752 kubelet[2597]: I0212 22:09:08.221631 2597 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 22:09:08.222450 kubelet[2597]: I0212 22:09:08.222416 2597 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:09:08.246322 kubelet[2597]: I0212 22:09:08.246304 2597 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 22:09:08.247628 kernel: kauditd_printk_skb: 625 callbacks suppressed Feb 12 22:09:08.247667 kernel: audit: type=1400 audit(1707775748.219:970): avc: denied { mac_admin } for pid=2597 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.254681 kubelet[2597]: I0212 22:09:08.254666 2597 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 22:09:08.254681 kubelet[2597]: I0212 22:09:08.254680 2597 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 22:09:08.254771 kubelet[2597]: I0212 22:09:08.254693 2597 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 22:09:08.254771 kubelet[2597]: E0212 22:09:08.254731 2597 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 22:09:08.258036 kubelet[2597]: I0212 22:09:08.258022 2597 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:09:08.258036 kubelet[2597]: I0212 22:09:08.258032 2597 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:09:08.258036 kubelet[2597]: I0212 22:09:08.258041 2597 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:09:08.258145 kubelet[2597]: I0212 22:09:08.258129 2597 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 22:09:08.258145 kubelet[2597]: I0212 22:09:08.258137 2597 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 22:09:08.258145 kubelet[2597]: I0212 22:09:08.258141 2597 policy_none.go:49] "None policy: Start" Feb 12 22:09:08.258408 kubelet[2597]: I0212 22:09:08.258400 2597 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:09:08.258408 kubelet[2597]: I0212 22:09:08.258411 2597 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:09:08.258483 kubelet[2597]: I0212 22:09:08.258477 2597 state_mem.go:75] "Updated machine memory state" Feb 12 22:09:08.260404 kubelet[2597]: I0212 22:09:08.260391 2597 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:09:08.260460 kubelet[2597]: I0212 22:09:08.260448 2597 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:09:08.260707 kubelet[2597]: I0212 22:09:08.260696 2597 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:09:08.219000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:09:08.323933 kubelet[2597]: I0212 22:09:08.323915 2597 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.341795 kernel: audit: type=1401 audit(1707775748.219:970): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:09:08.341878 kernel: audit: type=1300 audit(1707775748.219:970): arch=c000003e syscall=188 success=no exit=-22 a0=c0005a0630 a1=c0005b4510 a2=c0005a0600 a3=25 items=0 ppid=1 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:08.219000 audit[2597]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005a0630 a1=c0005b4510 a2=c0005a0600 a3=25 items=0 ppid=1 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:08.345986 kubelet[2597]: I0212 22:09:08.345973 2597 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.346048 kubelet[2597]: I0212 22:09:08.346016 2597 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.355646 kubelet[2597]: I0212 22:09:08.355634 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:08.355708 kubelet[2597]: I0212 22:09:08.355674 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:08.355708 kubelet[2597]: I0212 22:09:08.355692 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:08.359297 kubelet[2597]: E0212 22:09:08.359287 2597 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.219000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:09:08.523427 kubelet[2597]: I0212 22:09:08.523380 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/12dd90e1639897c20f405b30e737ba0e-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" (UID: \"12dd90e1639897c20f405b30e737ba0e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.523427 kubelet[2597]: I0212 22:09:08.523406 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/12dd90e1639897c20f405b30e737ba0e-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" (UID: \"12dd90e1639897c20f405b30e737ba0e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.523532 kubelet[2597]: I0212 22:09:08.523436 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/12dd90e1639897c20f405b30e737ba0e-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" (UID: \"12dd90e1639897c20f405b30e737ba0e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.523532 kubelet[2597]: I0212 22:09:08.523467 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9b897f1e79211145e72ae3e4c2ca36c8-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-0de130baf6\" (UID: \"9b897f1e79211145e72ae3e4c2ca36c8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.523532 kubelet[2597]: I0212 22:09:08.523479 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9b897f1e79211145e72ae3e4c2ca36c8-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-0de130baf6\" (UID: \"9b897f1e79211145e72ae3e4c2ca36c8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.523532 kubelet[2597]: I0212 22:09:08.523495 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/12dd90e1639897c20f405b30e737ba0e-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" (UID: \"12dd90e1639897c20f405b30e737ba0e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.523532 kubelet[2597]: I0212 22:09:08.523510 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8940bf58c6a186d67bf99e45d453d7d8-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-0de130baf6\" (UID: \"8940bf58c6a186d67bf99e45d453d7d8\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.523626 kubelet[2597]: I0212 22:09:08.523525 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9b897f1e79211145e72ae3e4c2ca36c8-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-0de130baf6\" (UID: \"9b897f1e79211145e72ae3e4c2ca36c8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.523626 kubelet[2597]: I0212 22:09:08.523537 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/12dd90e1639897c20f405b30e737ba0e-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" (UID: \"12dd90e1639897c20f405b30e737ba0e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.524208 kernel: audit: type=1327 audit(1707775748.219:970): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:09:08.524236 kernel: audit: type=1400 audit(1707775748.220:971): avc: denied { mac_admin } for pid=2597 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.220000 audit[2597]: AVC avc: denied { mac_admin } for pid=2597 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.586357 kernel: audit: type=1401 audit(1707775748.220:971): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:09:08.220000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:09:08.617209 kubelet[2597]: E0212 22:09:08.617165 2597 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-0de130baf6\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:08.618299 kernel: audit: type=1300 audit(1707775748.220:971): arch=c000003e syscall=188 success=no exit=-22 a0=c000396960 a1=c00005cd68 a2=c00004c150 a3=25 items=0 ppid=1 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:08.220000 audit[2597]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000396960 a1=c00005cd68 a2=c00004c150 a3=25 items=0 ppid=1 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:08.220000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:09:08.799468 kernel: audit: type=1327 audit(1707775748.220:971): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:09:08.799511 kernel: audit: type=1400 audit(1707775748.259:972): avc: denied { mac_admin } for pid=2597 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.259000 audit[2597]: AVC avc: denied { mac_admin } for pid=2597 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:08.860685 kernel: audit: type=1401 audit(1707775748.259:972): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:09:08.259000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:09:08.259000 audit[2597]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000544fc0 a1=c0005b4f90 a2=c000544f90 a3=25 items=0 ppid=1 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:08.259000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:09:09.213295 kubelet[2597]: I0212 22:09:09.213095 2597 apiserver.go:52] "Watching apiserver" Feb 12 22:09:09.422765 kubelet[2597]: I0212 22:09:09.422665 2597 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:09:09.429988 kubelet[2597]: I0212 22:09:09.429874 2597 reconciler.go:41] "Reconciler: start to sync state" Feb 12 22:09:09.817042 kubelet[2597]: E0212 22:09:09.816993 2597 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-0de130baf6\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:10.024182 kubelet[2597]: E0212 22:09:10.024080 2597 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-0de130baf6\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:10.222636 kubelet[2597]: E0212 22:09:10.222454 2597 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-0de130baf6\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-0de130baf6" Feb 12 22:09:10.431764 kubelet[2597]: I0212 22:09:10.431746 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-0de130baf6" podStartSLOduration=3.431691419 pod.CreationTimestamp="2024-02-12 22:09:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:09:10.431646758 +0000 UTC m=+2.287672414" watchObservedRunningTime="2024-02-12 22:09:10.431691419 +0000 UTC m=+2.287717074" Feb 12 22:09:10.817543 kubelet[2597]: I0212 22:09:10.817495 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0de130baf6" podStartSLOduration=4.817470573 pod.CreationTimestamp="2024-02-12 22:09:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:09:10.817358367 +0000 UTC m=+2.673384023" watchObservedRunningTime="2024-02-12 22:09:10.817470573 +0000 UTC m=+2.673496225" Feb 12 22:09:10.841868 systemd[1]: Started sshd@7-147.75.49.97:22-43.156.170.69:33868.service. Feb 12 22:09:10.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.49.97:22-43.156.170.69:33868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:11.216762 kubelet[2597]: I0212 22:09:11.216670 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-0de130baf6" podStartSLOduration=3.216648484 pod.CreationTimestamp="2024-02-12 22:09:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:09:11.216564591 +0000 UTC m=+3.072590247" watchObservedRunningTime="2024-02-12 22:09:11.216648484 +0000 UTC m=+3.072674136" Feb 12 22:09:11.830381 sshd[2702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.170.69 user=root Feb 12 22:09:11.829000 audit[2702]: USER_AUTH pid=2702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.170.69 addr=43.156.170.69 terminal=ssh res=failed' Feb 12 22:09:13.669715 sshd[2702]: Failed password for root from 43.156.170.69 port 33868 ssh2 Feb 12 22:09:13.856730 sudo[1632]: pam_unix(sudo:session): session closed for user root Feb 12 22:09:13.855000 audit[1632]: USER_END pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:09:13.859593 sshd[1628]: pam_unix(sshd:session): session closed for user core Feb 12 22:09:13.865642 systemd[1]: sshd@6-147.75.49.97:22-139.178.68.195:48326.service: Deactivated successfully. Feb 12 22:09:13.867522 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 22:09:13.867950 systemd[1]: session-9.scope: Consumed 2.827s CPU time. Feb 12 22:09:13.869222 systemd-logind[1464]: Session 9 logged out. Waiting for processes to exit. Feb 12 22:09:13.871477 systemd-logind[1464]: Removed session 9. Feb 12 22:09:13.895227 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 22:09:13.895295 kernel: audit: type=1106 audit(1707775753.855:975): pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:09:13.917297 sshd[2702]: Received disconnect from 43.156.170.69 port 33868:11: Bye Bye [preauth] Feb 12 22:09:13.917297 sshd[2702]: Disconnected from authenticating user root 43.156.170.69 port 33868 [preauth] Feb 12 22:09:13.917834 systemd[1]: sshd@7-147.75.49.97:22-43.156.170.69:33868.service: Deactivated successfully. Feb 12 22:09:13.856000 audit[1632]: CRED_DISP pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:09:14.062000 kernel: audit: type=1104 audit(1707775753.856:976): pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:09:14.062027 kernel: audit: type=1106 audit(1707775753.861:977): pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:09:13.861000 audit[1628]: USER_END pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:09:14.152925 kernel: audit: type=1104 audit(1707775753.861:978): pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:09:13.861000 audit[1628]: CRED_DISP pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:09:14.238106 kernel: audit: type=1131 audit(1707775753.865:979): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.49.97:22-139.178.68.195:48326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:13.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.49.97:22-139.178.68.195:48326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:14.322654 kernel: audit: type=1131 audit(1707775753.917:980): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.49.97:22-43.156.170.69:33868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:13.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.49.97:22-43.156.170.69:33868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:16.901339 update_engine[1467]: I0212 22:09:16.901206 1467 update_attempter.cc:509] Updating boot flags... Feb 12 22:09:20.264874 kubelet[2597]: I0212 22:09:20.264798 2597 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 22:09:20.265886 env[1477]: time="2024-02-12T22:09:20.265622557Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 22:09:20.266524 kubelet[2597]: I0212 22:09:20.266098 2597 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 22:09:21.083523 kubelet[2597]: I0212 22:09:21.083427 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:21.101329 systemd[1]: Created slice kubepods-besteffort-pod263372f8_ee6a_4332_89f6_c32a10e33bee.slice. Feb 12 22:09:21.106034 kubelet[2597]: I0212 22:09:21.105989 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/263372f8-ee6a-4332-89f6-c32a10e33bee-kube-proxy\") pod \"kube-proxy-r576f\" (UID: \"263372f8-ee6a-4332-89f6-c32a10e33bee\") " pod="kube-system/kube-proxy-r576f" Feb 12 22:09:21.106282 kubelet[2597]: I0212 22:09:21.106094 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kpq72\" (UniqueName: \"kubernetes.io/projected/263372f8-ee6a-4332-89f6-c32a10e33bee-kube-api-access-kpq72\") pod \"kube-proxy-r576f\" (UID: \"263372f8-ee6a-4332-89f6-c32a10e33bee\") " pod="kube-system/kube-proxy-r576f" Feb 12 22:09:21.106282 kubelet[2597]: I0212 22:09:21.106168 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/263372f8-ee6a-4332-89f6-c32a10e33bee-xtables-lock\") pod \"kube-proxy-r576f\" (UID: \"263372f8-ee6a-4332-89f6-c32a10e33bee\") " pod="kube-system/kube-proxy-r576f" Feb 12 22:09:21.106546 kubelet[2597]: I0212 22:09:21.106321 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/263372f8-ee6a-4332-89f6-c32a10e33bee-lib-modules\") pod \"kube-proxy-r576f\" (UID: \"263372f8-ee6a-4332-89f6-c32a10e33bee\") " pod="kube-system/kube-proxy-r576f" Feb 12 22:09:21.256311 kubelet[2597]: I0212 22:09:21.256228 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:21.267710 systemd[1]: Created slice kubepods-besteffort-pod121a2829_782e_4ae6_b3ba_c2390d56a569.slice. Feb 12 22:09:21.308263 kubelet[2597]: I0212 22:09:21.308204 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/121a2829-782e-4ae6-b3ba-c2390d56a569-var-lib-calico\") pod \"tigera-operator-cfc98749c-hxwls\" (UID: \"121a2829-782e-4ae6-b3ba-c2390d56a569\") " pod="tigera-operator/tigera-operator-cfc98749c-hxwls" Feb 12 22:09:21.308900 kubelet[2597]: I0212 22:09:21.308292 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d2hpb\" (UniqueName: \"kubernetes.io/projected/121a2829-782e-4ae6-b3ba-c2390d56a569-kube-api-access-d2hpb\") pod \"tigera-operator-cfc98749c-hxwls\" (UID: \"121a2829-782e-4ae6-b3ba-c2390d56a569\") " pod="tigera-operator/tigera-operator-cfc98749c-hxwls" Feb 12 22:09:21.417162 env[1477]: time="2024-02-12T22:09:21.416907080Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r576f,Uid:263372f8-ee6a-4332-89f6-c32a10e33bee,Namespace:kube-system,Attempt:0,}" Feb 12 22:09:21.440230 env[1477]: time="2024-02-12T22:09:21.440006968Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:09:21.440230 env[1477]: time="2024-02-12T22:09:21.440105444Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:09:21.440230 env[1477]: time="2024-02-12T22:09:21.440143329Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:09:21.440666 env[1477]: time="2024-02-12T22:09:21.440525771Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1001dd3ea30d709f7575947211a858d707d0515a9e12969d7c4b0aefe8a6b150 pid=2813 runtime=io.containerd.runc.v2 Feb 12 22:09:21.463780 systemd[1]: Started cri-containerd-1001dd3ea30d709f7575947211a858d707d0515a9e12969d7c4b0aefe8a6b150.scope. Feb 12 22:09:21.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.570516 env[1477]: time="2024-02-12T22:09:21.570487698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-hxwls,Uid:121a2829-782e-4ae6-b3ba-c2390d56a569,Namespace:tigera-operator,Attempt:0,}" Feb 12 22:09:21.577847 env[1477]: time="2024-02-12T22:09:21.577814705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:09:21.577847 env[1477]: time="2024-02-12T22:09:21.577834478Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:09:21.577847 env[1477]: time="2024-02-12T22:09:21.577841431Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:09:21.578008 env[1477]: time="2024-02-12T22:09:21.577897927Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/12ae3f8e6e940f4037c5f5525c89c3dc5ed8b2936611f2fd2b3ced8fc0a1c120 pid=2846 runtime=io.containerd.runc.v2 Feb 12 22:09:21.601069 kernel: audit: type=1400 audit(1707775761.477:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.601123 kernel: audit: type=1400 audit(1707775761.477:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.601165 kernel: audit: type=1400 audit(1707775761.477:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.664596 systemd[1]: Started cri-containerd-12ae3f8e6e940f4037c5f5525c89c3dc5ed8b2936611f2fd2b3ced8fc0a1c120.scope. Feb 12 22:09:21.726700 kernel: audit: type=1400 audit(1707775761.477:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.726753 kernel: audit: type=1400 audit(1707775761.477:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.790992 kernel: audit: type=1400 audit(1707775761.477:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.917783 kernel: audit: type=1400 audit(1707775761.477:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.917811 kernel: audit: type=1400 audit(1707775761.477:988): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.981729 kernel: audit: type=1400 audit(1707775761.477:989): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.981773 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:09:21.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit: BPF prog-id=112 op=LOAD Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2813 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:21.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303164643365613330643730396637353735393437323131613835 Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2813 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:21.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303164643365613330643730396637353735393437323131613835 Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit: BPF prog-id=113 op=LOAD Feb 12 22:09:21.662000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.662000 audit: BPF prog-id=114 op=LOAD Feb 12 22:09:21.662000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024790 items=0 ppid=2813 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:21.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303164643365613330643730396637353735393437323131613835 Feb 12 22:09:21.853000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2846 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:21.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132616533663865366539343066343033376335663535323563383963 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2846 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:21.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132616533663865366539343066343033376335663535323563383963 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:21.853000 audit: BPF prog-id=115 op=LOAD Feb 12 22:09:21.853000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000247d8 items=0 ppid=2813 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:21.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303164643365613330643730396637353735393437323131613835 Feb 12 22:09:21.853000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000286330 items=0 ppid=2846 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:21.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132616533663865366539343066343033376335663535323563383963 Feb 12 22:09:22.044000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.044000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.044000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.044000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.044000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.044000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.044000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.044000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit: BPF prog-id=114 op=UNLOAD Feb 12 22:09:22.071000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.044000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.044000 audit: BPF prog-id=117 op=LOAD Feb 12 22:09:22.044000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000286378 items=0 ppid=2846 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132616533663865366539343066343033376335663535323563383963 Feb 12 22:09:22.071000 audit: BPF prog-id=117 op=UNLOAD Feb 12 22:09:22.071000 audit: BPF prog-id=116 op=UNLOAD Feb 12 22:09:22.071000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit: BPF prog-id=118 op=LOAD Feb 12 22:09:22.071000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.071000 audit: BPF prog-id=119 op=LOAD Feb 12 22:09:22.071000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024be8 items=0 ppid=2813 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303164643365613330643730396637353735393437323131613835 Feb 12 22:09:22.071000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000286788 items=0 ppid=2846 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132616533663865366539343066343033376335663535323563383963 Feb 12 22:09:22.077129 env[1477]: time="2024-02-12T22:09:22.077105194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r576f,Uid:263372f8-ee6a-4332-89f6-c32a10e33bee,Namespace:kube-system,Attempt:0,} returns sandbox id \"1001dd3ea30d709f7575947211a858d707d0515a9e12969d7c4b0aefe8a6b150\"" Feb 12 22:09:22.078156 env[1477]: time="2024-02-12T22:09:22.078142257Z" level=info msg="CreateContainer within sandbox \"1001dd3ea30d709f7575947211a858d707d0515a9e12969d7c4b0aefe8a6b150\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 22:09:22.083463 env[1477]: time="2024-02-12T22:09:22.083416505Z" level=info msg="CreateContainer within sandbox \"1001dd3ea30d709f7575947211a858d707d0515a9e12969d7c4b0aefe8a6b150\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f671a5bcfdaefdd6ac1b893452cc735172fa8adc040e2ae2bd762e3a395c8ad9\"" Feb 12 22:09:22.083705 env[1477]: time="2024-02-12T22:09:22.083671561Z" level=info msg="StartContainer for \"f671a5bcfdaefdd6ac1b893452cc735172fa8adc040e2ae2bd762e3a395c8ad9\"" Feb 12 22:09:22.089270 env[1477]: time="2024-02-12T22:09:22.089242445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-hxwls,Uid:121a2829-782e-4ae6-b3ba-c2390d56a569,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"12ae3f8e6e940f4037c5f5525c89c3dc5ed8b2936611f2fd2b3ced8fc0a1c120\"" Feb 12 22:09:22.090034 env[1477]: time="2024-02-12T22:09:22.090018308Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 22:09:22.091591 systemd[1]: Started cri-containerd-f671a5bcfdaefdd6ac1b893452cc735172fa8adc040e2ae2bd762e3a395c8ad9.scope. Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4479522098 items=0 ppid=2813 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636373161356263666461656664643661633162383933343532636337 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit: BPF prog-id=120 op=LOAD Feb 12 22:09:22.098000 audit[2888]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c8188 items=0 ppid=2813 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636373161356263666461656664643661633162383933343532636337 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit: BPF prog-id=121 op=LOAD Feb 12 22:09:22.098000 audit[2888]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003c81d8 items=0 ppid=2813 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636373161356263666461656664643661633162383933343532636337 Feb 12 22:09:22.098000 audit: BPF prog-id=121 op=UNLOAD Feb 12 22:09:22.098000 audit: BPF prog-id=120 op=UNLOAD Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { perfmon } for pid=2888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit[2888]: AVC avc: denied { bpf } for pid=2888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:22.098000 audit: BPF prog-id=122 op=LOAD Feb 12 22:09:22.098000 audit[2888]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c8268 items=0 ppid=2813 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636373161356263666461656664643661633162383933343532636337 Feb 12 22:09:22.104693 env[1477]: time="2024-02-12T22:09:22.104670177Z" level=info msg="StartContainer for \"f671a5bcfdaefdd6ac1b893452cc735172fa8adc040e2ae2bd762e3a395c8ad9\" returns successfully" Feb 12 22:09:22.126000 audit[2949]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=2949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.126000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdadb7a080 a2=0 a3=7ffdadb7a06c items=0 ppid=2903 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:09:22.127000 audit[2950]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.127000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda862d560 a2=0 a3=7ffda862d54c items=0 ppid=2903 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:09:22.127000 audit[2952]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.127000 audit[2952]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc49ab5f70 a2=0 a3=7ffc49ab5f5c items=0 ppid=2903 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:09:22.127000 audit[2956]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.127000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeee88e020 a2=0 a3=7ffeee88e00c items=0 ppid=2903 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:09:22.128000 audit[2958]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.128000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe90e3eda0 a2=0 a3=7ffe90e3ed8c items=0 ppid=2903 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:09:22.128000 audit[2957]: NETFILTER_CFG table=filter:64 family=2 entries=1 op=nft_register_chain pid=2957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.128000 audit[2957]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb622db90 a2=0 a3=7ffdb622db7c items=0 ppid=2903 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:09:22.233000 audit[2959]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.233000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff396e38b0 a2=0 a3=7fff396e389c items=0 ppid=2903 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:09:22.240000 audit[2961]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.240000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff4c3a0f60 a2=0 a3=7fff4c3a0f4c items=0 ppid=2903 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 22:09:22.250000 audit[2964]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.250000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd272d0290 a2=0 a3=7ffd272d027c items=0 ppid=2903 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.250000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 22:09:22.252000 audit[2965]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.252000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccbbc13e0 a2=0 a3=7ffccbbc13cc items=0 ppid=2903 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:09:22.259000 audit[2967]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.259000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd06ae3b20 a2=0 a3=7ffd06ae3b0c items=0 ppid=2903 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:09:22.262000 audit[2968]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.262000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb7107e80 a2=0 a3=7ffcb7107e6c items=0 ppid=2903 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:09:22.268000 audit[2970]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.268000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc6f57ca90 a2=0 a3=7ffc6f57ca7c items=0 ppid=2903 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:09:22.278000 audit[2973]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.278000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc36961840 a2=0 a3=7ffc3696182c items=0 ppid=2903 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 22:09:22.281000 audit[2976]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.281000 audit[2976]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe006f39b0 a2=0 a3=7ffe006f399c items=0 ppid=2903 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:09:22.288000 audit[2978]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.288000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd28f7c780 a2=0 a3=7ffd28f7c76c items=0 ppid=2903 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:09:22.290000 audit[2979]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.290000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff93e35250 a2=0 a3=7fff93e3523c items=0 ppid=2903 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:09:22.297000 audit[2981]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.297000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd2e8e9b0 a2=0 a3=7fffd2e8e99c items=0 ppid=2903 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:09:22.306821 kubelet[2597]: I0212 22:09:22.306760 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-r576f" podStartSLOduration=1.306680044 pod.CreationTimestamp="2024-02-12 22:09:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:09:22.306106106 +0000 UTC m=+14.162131846" watchObservedRunningTime="2024-02-12 22:09:22.306680044 +0000 UTC m=+14.162705748" Feb 12 22:09:22.306000 audit[2984]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.306000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1f433230 a2=0 a3=7ffd1f43321c items=0 ppid=2903 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:09:22.317000 audit[2987]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.317000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff284e01a0 a2=0 a3=7fff284e018c items=0 ppid=2903 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:09:22.319000 audit[2988]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.319000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe12ed6870 a2=0 a3=7ffe12ed685c items=0 ppid=2903 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:09:22.325000 audit[2990]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.325000 audit[2990]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd37b635c0 a2=0 a3=7ffd37b635ac items=0 ppid=2903 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:09:22.334000 audit[2993]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:09:22.334000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffff05644d0 a2=0 a3=7ffff05644bc items=0 ppid=2903 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:09:22.360000 audit[2997]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2997 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:09:22.360000 audit[2997]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc2ae051c0 a2=0 a3=7ffc2ae051ac items=0 ppid=2903 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.360000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:09:22.376000 audit[2997]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2997 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:09:22.376000 audit[2997]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffc2ae051c0 a2=0 a3=7ffc2ae051ac items=0 ppid=2903 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:09:22.379000 audit[3002]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.379000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5d49db40 a2=0 a3=7ffe5d49db2c items=0 ppid=2903 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:09:22.385000 audit[3004]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=3004 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.385000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd95393130 a2=0 a3=7ffd9539311c items=0 ppid=2903 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 22:09:22.395000 audit[3007]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=3007 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.395000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc9715e9f0 a2=0 a3=7ffc9715e9dc items=0 ppid=2903 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 22:09:22.398000 audit[3008]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=3008 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.398000 audit[3008]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3b4d1f70 a2=0 a3=7ffd3b4d1f5c items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:09:22.404000 audit[3010]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=3010 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.404000 audit[3010]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd5d6c680 a2=0 a3=7ffdd5d6c66c items=0 ppid=2903 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:09:22.407000 audit[3011]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3011 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.407000 audit[3011]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe83079ee0 a2=0 a3=7ffe83079ecc items=0 ppid=2903 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:09:22.413000 audit[3013]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3013 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.413000 audit[3013]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf3c6e9b0 a2=0 a3=7ffdf3c6e99c items=0 ppid=2903 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 22:09:22.422000 audit[3016]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=3016 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.422000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff51643400 a2=0 a3=7fff516433ec items=0 ppid=2903 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:09:22.425000 audit[3017]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=3017 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.425000 audit[3017]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdee6e410 a2=0 a3=7fffdee6e3fc items=0 ppid=2903 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:09:22.431000 audit[3019]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=3019 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.431000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc85a2b630 a2=0 a3=7ffc85a2b61c items=0 ppid=2903 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:09:22.434000 audit[3020]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3020 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.434000 audit[3020]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbe8b2fc0 a2=0 a3=7ffdbe8b2fac items=0 ppid=2903 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:09:22.440000 audit[3022]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3022 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.440000 audit[3022]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd027dc1f0 a2=0 a3=7ffd027dc1dc items=0 ppid=2903 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:09:22.449000 audit[3025]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=3025 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.449000 audit[3025]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3ece24a0 a2=0 a3=7ffe3ece248c items=0 ppid=2903 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:09:22.458000 audit[3028]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3028 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.458000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca2b7d110 a2=0 a3=7ffca2b7d0fc items=0 ppid=2903 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 22:09:22.461000 audit[3029]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3029 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.461000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffba4cc520 a2=0 a3=7fffba4cc50c items=0 ppid=2903 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:09:22.466000 audit[3031]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.466000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe7df01ed0 a2=0 a3=7ffe7df01ebc items=0 ppid=2903 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:09:22.474000 audit[3034]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3034 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:09:22.474000 audit[3034]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd4d8d0ca0 a2=0 a3=7ffd4d8d0c8c items=0 ppid=2903 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:09:22.488000 audit[3038]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:09:22.488000 audit[3038]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe275c8060 a2=0 a3=7ffe275c804c items=0 ppid=2903 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.488000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:09:22.489000 audit[3038]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:09:22.489000 audit[3038]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffe275c8060 a2=0 a3=7ffe275c804c items=0 ppid=2903 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:22.489000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:09:23.236075 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount302644475.mount: Deactivated successfully. Feb 12 22:09:23.918536 env[1477]: time="2024-02-12T22:09:23.918515213Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:23.919160 env[1477]: time="2024-02-12T22:09:23.919148490Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:23.920080 env[1477]: time="2024-02-12T22:09:23.920033697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:23.921272 env[1477]: time="2024-02-12T22:09:23.921216933Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:23.921600 env[1477]: time="2024-02-12T22:09:23.921551374Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 22:09:23.922813 env[1477]: time="2024-02-12T22:09:23.922800198Z" level=info msg="CreateContainer within sandbox \"12ae3f8e6e940f4037c5f5525c89c3dc5ed8b2936611f2fd2b3ced8fc0a1c120\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 22:09:23.928681 env[1477]: time="2024-02-12T22:09:23.928636383Z" level=info msg="CreateContainer within sandbox \"12ae3f8e6e940f4037c5f5525c89c3dc5ed8b2936611f2fd2b3ced8fc0a1c120\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"34011b747cb00072952561edbf6a902cbdbf6070a74550d252db3fee11de9bf0\"" Feb 12 22:09:23.928892 env[1477]: time="2024-02-12T22:09:23.928879495Z" level=info msg="StartContainer for \"34011b747cb00072952561edbf6a902cbdbf6070a74550d252db3fee11de9bf0\"" Feb 12 22:09:23.938211 systemd[1]: Started cri-containerd-34011b747cb00072952561edbf6a902cbdbf6070a74550d252db3fee11de9bf0.scope. Feb 12 22:09:23.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit: BPF prog-id=123 op=LOAD Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2846 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:23.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303131623734376362303030373239353235363165646266366139 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2846 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:23.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303131623734376362303030373239353235363165646266366139 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit: BPF prog-id=124 op=LOAD Feb 12 22:09:23.942000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00027bdc0 items=0 ppid=2846 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:23.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303131623734376362303030373239353235363165646266366139 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit: BPF prog-id=125 op=LOAD Feb 12 22:09:23.942000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00027be08 items=0 ppid=2846 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:23.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303131623734376362303030373239353235363165646266366139 Feb 12 22:09:23.942000 audit: BPF prog-id=125 op=UNLOAD Feb 12 22:09:23.942000 audit: BPF prog-id=124 op=UNLOAD Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:23.942000 audit: BPF prog-id=126 op=LOAD Feb 12 22:09:23.942000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003ca218 items=0 ppid=2846 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:23.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303131623734376362303030373239353235363165646266366139 Feb 12 22:09:23.948654 env[1477]: time="2024-02-12T22:09:23.948603796Z" level=info msg="StartContainer for \"34011b747cb00072952561edbf6a902cbdbf6070a74550d252db3fee11de9bf0\" returns successfully" Feb 12 22:09:24.315104 kubelet[2597]: I0212 22:09:24.315038 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-hxwls" podStartSLOduration=-9.22337203353986e+09 pod.CreationTimestamp="2024-02-12 22:09:21 +0000 UTC" firstStartedPulling="2024-02-12 22:09:22.089794064 +0000 UTC m=+13.945819719" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:09:24.314405665 +0000 UTC m=+16.170431424" watchObservedRunningTime="2024-02-12 22:09:24.314916458 +0000 UTC m=+16.170942163" Feb 12 22:09:25.496618 systemd[1]: Started sshd@8-147.75.49.97:22-150.95.83.149:44072.service. Feb 12 22:09:25.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.49.97:22-150.95.83.149:44072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:25.851000 audit[3118]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:09:25.851000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffe6f068d0 a2=0 a3=7fffe6f068bc items=0 ppid=2903 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:25.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:09:25.852000 audit[3118]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:09:25.852000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffe6f068d0 a2=0 a3=7fffe6f068bc items=0 ppid=2903 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:25.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:09:25.954000 audit[3144]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:09:25.954000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffd40363c90 a2=0 a3=7ffd40363c7c items=0 ppid=2903 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:25.954000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:09:25.958200 kubelet[2597]: I0212 22:09:25.958169 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:25.956000 audit[3144]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:09:25.956000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd40363c90 a2=0 a3=7ffd40363c7c items=0 ppid=2903 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:25.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:09:25.964168 systemd[1]: Created slice kubepods-besteffort-pod8c89dde3_2f56_4018_a6ea_712eefb29958.slice. Feb 12 22:09:25.981348 kubelet[2597]: I0212 22:09:25.981324 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:25.984660 systemd[1]: Created slice kubepods-besteffort-podc39a1510_2261_49b3_b0ed_7fc9ad35ad1c.slice. Feb 12 22:09:26.040229 kubelet[2597]: I0212 22:09:26.040111 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-lib-modules\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.040229 kubelet[2597]: I0212 22:09:26.040229 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-var-lib-calico\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.040640 kubelet[2597]: I0212 22:09:26.040499 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-cni-net-dir\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.040752 kubelet[2597]: I0212 22:09:26.040698 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-flexvol-driver-host\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.040856 kubelet[2597]: I0212 22:09:26.040786 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-var-run-calico\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.040992 kubelet[2597]: I0212 22:09:26.040862 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g8ptd\" (UniqueName: \"kubernetes.io/projected/8c89dde3-2f56-4018-a6ea-712eefb29958-kube-api-access-g8ptd\") pod \"calico-typha-fd657d7b4-bhlwt\" (UID: \"8c89dde3-2f56-4018-a6ea-712eefb29958\") " pod="calico-system/calico-typha-fd657d7b4-bhlwt" Feb 12 22:09:26.040992 kubelet[2597]: I0212 22:09:26.040966 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-policysync\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.041216 kubelet[2597]: I0212 22:09:26.041116 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-tigera-ca-bundle\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.041321 kubelet[2597]: I0212 22:09:26.041226 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-xtables-lock\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.041421 kubelet[2597]: I0212 22:09:26.041335 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-node-certs\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.041421 kubelet[2597]: I0212 22:09:26.041404 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qvg2z\" (UniqueName: \"kubernetes.io/projected/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-kube-api-access-qvg2z\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.041620 kubelet[2597]: I0212 22:09:26.041475 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/8c89dde3-2f56-4018-a6ea-712eefb29958-typha-certs\") pod \"calico-typha-fd657d7b4-bhlwt\" (UID: \"8c89dde3-2f56-4018-a6ea-712eefb29958\") " pod="calico-system/calico-typha-fd657d7b4-bhlwt" Feb 12 22:09:26.041726 kubelet[2597]: I0212 22:09:26.041614 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-cni-bin-dir\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.041825 kubelet[2597]: I0212 22:09:26.041756 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c39a1510-2261-49b3-b0ed-7fc9ad35ad1c-cni-log-dir\") pod \"calico-node-74w6s\" (UID: \"c39a1510-2261-49b3-b0ed-7fc9ad35ad1c\") " pod="calico-system/calico-node-74w6s" Feb 12 22:09:26.042093 kubelet[2597]: I0212 22:09:26.041961 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8c89dde3-2f56-4018-a6ea-712eefb29958-tigera-ca-bundle\") pod \"calico-typha-fd657d7b4-bhlwt\" (UID: \"8c89dde3-2f56-4018-a6ea-712eefb29958\") " pod="calico-system/calico-typha-fd657d7b4-bhlwt" Feb 12 22:09:26.115745 kubelet[2597]: I0212 22:09:26.115587 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:09:26.116300 kubelet[2597]: E0212 22:09:26.116249 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:26.143486 kubelet[2597]: I0212 22:09:26.143381 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d69383b0-7b9e-4b37-94b0-ee606e362b74-socket-dir\") pod \"csi-node-driver-242vw\" (UID: \"d69383b0-7b9e-4b37-94b0-ee606e362b74\") " pod="calico-system/csi-node-driver-242vw" Feb 12 22:09:26.143741 kubelet[2597]: I0212 22:09:26.143679 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d69383b0-7b9e-4b37-94b0-ee606e362b74-varrun\") pod \"csi-node-driver-242vw\" (UID: \"d69383b0-7b9e-4b37-94b0-ee606e362b74\") " pod="calico-system/csi-node-driver-242vw" Feb 12 22:09:26.143913 kubelet[2597]: I0212 22:09:26.143853 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d69383b0-7b9e-4b37-94b0-ee606e362b74-kubelet-dir\") pod \"csi-node-driver-242vw\" (UID: \"d69383b0-7b9e-4b37-94b0-ee606e362b74\") " pod="calico-system/csi-node-driver-242vw" Feb 12 22:09:26.144152 kubelet[2597]: I0212 22:09:26.144112 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4fzpl\" (UniqueName: \"kubernetes.io/projected/d69383b0-7b9e-4b37-94b0-ee606e362b74-kube-api-access-4fzpl\") pod \"csi-node-driver-242vw\" (UID: \"d69383b0-7b9e-4b37-94b0-ee606e362b74\") " pod="calico-system/csi-node-driver-242vw" Feb 12 22:09:26.145487 kubelet[2597]: E0212 22:09:26.145420 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.145880 kubelet[2597]: W0212 22:09:26.145812 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.146170 kubelet[2597]: E0212 22:09:26.145992 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.146684 kubelet[2597]: E0212 22:09:26.146633 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.146684 kubelet[2597]: W0212 22:09:26.146679 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.147294 kubelet[2597]: E0212 22:09:26.146858 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.147491 kubelet[2597]: E0212 22:09:26.147336 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.147491 kubelet[2597]: W0212 22:09:26.147376 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.147804 kubelet[2597]: E0212 22:09:26.147556 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.148013 kubelet[2597]: E0212 22:09:26.147987 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.148227 kubelet[2597]: W0212 22:09:26.148024 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.148227 kubelet[2597]: E0212 22:09:26.148127 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.148693 kubelet[2597]: E0212 22:09:26.148652 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.148693 kubelet[2597]: W0212 22:09:26.148684 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.149047 kubelet[2597]: E0212 22:09:26.148775 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.149240 kubelet[2597]: E0212 22:09:26.149207 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.149425 kubelet[2597]: W0212 22:09:26.149240 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.149425 kubelet[2597]: E0212 22:09:26.149329 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.149753 kubelet[2597]: E0212 22:09:26.149718 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.149753 kubelet[2597]: W0212 22:09:26.149749 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.150090 kubelet[2597]: E0212 22:09:26.149829 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.150279 kubelet[2597]: E0212 22:09:26.150249 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.150463 kubelet[2597]: W0212 22:09:26.150282 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.150463 kubelet[2597]: E0212 22:09:26.150356 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.150803 kubelet[2597]: E0212 22:09:26.150767 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.150803 kubelet[2597]: W0212 22:09:26.150800 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.151189 kubelet[2597]: E0212 22:09:26.150879 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.151399 kubelet[2597]: E0212 22:09:26.151365 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.151585 kubelet[2597]: W0212 22:09:26.151398 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.151585 kubelet[2597]: E0212 22:09:26.151501 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.151885 kubelet[2597]: I0212 22:09:26.151636 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d69383b0-7b9e-4b37-94b0-ee606e362b74-registration-dir\") pod \"csi-node-driver-242vw\" (UID: \"d69383b0-7b9e-4b37-94b0-ee606e362b74\") " pod="calico-system/csi-node-driver-242vw" Feb 12 22:09:26.152049 kubelet[2597]: E0212 22:09:26.151997 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.152049 kubelet[2597]: W0212 22:09:26.152027 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.152245 kubelet[2597]: E0212 22:09:26.152123 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.152576 kubelet[2597]: E0212 22:09:26.152540 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.152693 kubelet[2597]: W0212 22:09:26.152577 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.152693 kubelet[2597]: E0212 22:09:26.152660 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.153121 kubelet[2597]: E0212 22:09:26.153085 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.153121 kubelet[2597]: W0212 22:09:26.153117 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.153430 kubelet[2597]: E0212 22:09:26.153248 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.153664 kubelet[2597]: E0212 22:09:26.153630 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.153664 kubelet[2597]: W0212 22:09:26.153661 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.154001 kubelet[2597]: E0212 22:09:26.153739 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.154210 kubelet[2597]: E0212 22:09:26.154172 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.154210 kubelet[2597]: W0212 22:09:26.154208 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.154520 kubelet[2597]: E0212 22:09:26.154338 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.154770 kubelet[2597]: E0212 22:09:26.154735 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.154770 kubelet[2597]: W0212 22:09:26.154766 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.155094 kubelet[2597]: E0212 22:09:26.154865 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.155327 kubelet[2597]: E0212 22:09:26.155293 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.155327 kubelet[2597]: W0212 22:09:26.155323 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.155654 kubelet[2597]: E0212 22:09:26.155435 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.156063 kubelet[2597]: E0212 22:09:26.155920 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.156063 kubelet[2597]: W0212 22:09:26.155980 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.156441 kubelet[2597]: E0212 22:09:26.156093 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.156626 kubelet[2597]: E0212 22:09:26.156523 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.156626 kubelet[2597]: W0212 22:09:26.156559 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.156994 kubelet[2597]: E0212 22:09:26.156647 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.157184 kubelet[2597]: E0212 22:09:26.157130 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.157184 kubelet[2597]: W0212 22:09:26.157166 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.157549 kubelet[2597]: E0212 22:09:26.157252 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.157740 kubelet[2597]: E0212 22:09:26.157683 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.157740 kubelet[2597]: W0212 22:09:26.157719 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.158089 kubelet[2597]: E0212 22:09:26.157803 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.158272 kubelet[2597]: E0212 22:09:26.158202 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.158272 kubelet[2597]: W0212 22:09:26.158234 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.158615 kubelet[2597]: E0212 22:09:26.158391 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.158796 kubelet[2597]: E0212 22:09:26.158676 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.158796 kubelet[2597]: W0212 22:09:26.158700 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.159152 kubelet[2597]: E0212 22:09:26.158799 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.159321 kubelet[2597]: E0212 22:09:26.159214 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.159321 kubelet[2597]: W0212 22:09:26.159249 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.159675 kubelet[2597]: E0212 22:09:26.159349 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.159851 kubelet[2597]: E0212 22:09:26.159728 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.159851 kubelet[2597]: W0212 22:09:26.159751 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.159851 kubelet[2597]: E0212 22:09:26.159819 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.160456 kubelet[2597]: E0212 22:09:26.160321 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.160456 kubelet[2597]: W0212 22:09:26.160354 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.160862 kubelet[2597]: E0212 22:09:26.160486 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.160862 kubelet[2597]: E0212 22:09:26.160853 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.161205 kubelet[2597]: W0212 22:09:26.160882 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.161205 kubelet[2597]: E0212 22:09:26.161002 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.161532 kubelet[2597]: E0212 22:09:26.161467 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.161532 kubelet[2597]: W0212 22:09:26.161505 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.161893 kubelet[2597]: E0212 22:09:26.161638 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.162248 kubelet[2597]: E0212 22:09:26.162196 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.162248 kubelet[2597]: W0212 22:09:26.162243 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.162583 kubelet[2597]: E0212 22:09:26.162354 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.162875 kubelet[2597]: E0212 22:09:26.162839 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.162875 kubelet[2597]: W0212 22:09:26.162869 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.163285 kubelet[2597]: E0212 22:09:26.162975 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.163451 kubelet[2597]: E0212 22:09:26.163350 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.163451 kubelet[2597]: W0212 22:09:26.163384 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.163758 kubelet[2597]: E0212 22:09:26.163470 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.163916 kubelet[2597]: E0212 22:09:26.163855 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.163916 kubelet[2597]: W0212 22:09:26.163880 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.164284 kubelet[2597]: E0212 22:09:26.163960 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.164508 kubelet[2597]: E0212 22:09:26.164465 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.164690 kubelet[2597]: W0212 22:09:26.164509 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.164690 kubelet[2597]: E0212 22:09:26.164576 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.165060 kubelet[2597]: E0212 22:09:26.165027 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.165060 kubelet[2597]: W0212 22:09:26.165055 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.165344 kubelet[2597]: E0212 22:09:26.165145 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.165503 kubelet[2597]: E0212 22:09:26.165474 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.165625 kubelet[2597]: W0212 22:09:26.165501 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.165625 kubelet[2597]: E0212 22:09:26.165601 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.165884 kubelet[2597]: E0212 22:09:26.165859 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.165884 kubelet[2597]: W0212 22:09:26.165884 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.166189 kubelet[2597]: E0212 22:09:26.165960 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.166326 kubelet[2597]: E0212 22:09:26.166299 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.166443 kubelet[2597]: W0212 22:09:26.166324 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.166443 kubelet[2597]: E0212 22:09:26.166370 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.166843 kubelet[2597]: E0212 22:09:26.166818 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.166969 kubelet[2597]: W0212 22:09:26.166844 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.166969 kubelet[2597]: E0212 22:09:26.166888 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.167269 kubelet[2597]: E0212 22:09:26.167246 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.167373 kubelet[2597]: W0212 22:09:26.167270 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.167373 kubelet[2597]: E0212 22:09:26.167298 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.167598 kubelet[2597]: E0212 22:09:26.167582 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.167754 kubelet[2597]: W0212 22:09:26.167612 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.167754 kubelet[2597]: E0212 22:09:26.167656 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.168811 kubelet[2597]: E0212 22:09:26.168179 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.168811 kubelet[2597]: W0212 22:09:26.168219 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.168811 kubelet[2597]: E0212 22:09:26.168268 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.171328 kubelet[2597]: E0212 22:09:26.171300 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.171328 kubelet[2597]: W0212 22:09:26.171322 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.171540 kubelet[2597]: E0212 22:09:26.171352 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.171688 kubelet[2597]: E0212 22:09:26.171668 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.171746 kubelet[2597]: W0212 22:09:26.171691 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.171746 kubelet[2597]: E0212 22:09:26.171722 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.264741 kubelet[2597]: E0212 22:09:26.264698 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.264741 kubelet[2597]: W0212 22:09:26.264712 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.264741 kubelet[2597]: E0212 22:09:26.264727 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.264904 kubelet[2597]: E0212 22:09:26.264895 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.264904 kubelet[2597]: W0212 22:09:26.264902 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.264979 kubelet[2597]: E0212 22:09:26.264912 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.265130 kubelet[2597]: E0212 22:09:26.265089 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.265130 kubelet[2597]: W0212 22:09:26.265098 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.265130 kubelet[2597]: E0212 22:09:26.265110 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.265352 kubelet[2597]: E0212 22:09:26.265309 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.265352 kubelet[2597]: W0212 22:09:26.265319 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.265352 kubelet[2597]: E0212 22:09:26.265334 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.265505 kubelet[2597]: E0212 22:09:26.265495 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.265505 kubelet[2597]: W0212 22:09:26.265505 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.265566 kubelet[2597]: E0212 22:09:26.265517 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.265695 kubelet[2597]: E0212 22:09:26.265662 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.265695 kubelet[2597]: W0212 22:09:26.265669 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.265695 kubelet[2597]: E0212 22:09:26.265680 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.265813 kubelet[2597]: E0212 22:09:26.265806 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.265846 kubelet[2597]: W0212 22:09:26.265813 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.265846 kubelet[2597]: E0212 22:09:26.265824 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.266002 kubelet[2597]: E0212 22:09:26.265963 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.266002 kubelet[2597]: W0212 22:09:26.265970 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.266002 kubelet[2597]: E0212 22:09:26.265980 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.266119 kubelet[2597]: E0212 22:09:26.266108 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.266119 kubelet[2597]: W0212 22:09:26.266117 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.266175 kubelet[2597]: E0212 22:09:26.266132 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.266244 kubelet[2597]: E0212 22:09:26.266236 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.266244 kubelet[2597]: W0212 22:09:26.266243 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.266303 kubelet[2597]: E0212 22:09:26.266254 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.266369 kubelet[2597]: E0212 22:09:26.266361 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.266369 kubelet[2597]: W0212 22:09:26.266368 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.266431 kubelet[2597]: E0212 22:09:26.266378 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.266538 kubelet[2597]: E0212 22:09:26.266530 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.266538 kubelet[2597]: W0212 22:09:26.266537 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.266627 kubelet[2597]: E0212 22:09:26.266573 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.266669 kubelet[2597]: E0212 22:09:26.266631 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.266669 kubelet[2597]: W0212 22:09:26.266637 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.266669 kubelet[2597]: E0212 22:09:26.266661 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.266763 kubelet[2597]: E0212 22:09:26.266731 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.266763 kubelet[2597]: W0212 22:09:26.266737 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.266763 kubelet[2597]: E0212 22:09:26.266746 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.266859 kubelet[2597]: E0212 22:09:26.266832 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.266859 kubelet[2597]: W0212 22:09:26.266837 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.266859 kubelet[2597]: E0212 22:09:26.266856 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.266966 kubelet[2597]: E0212 22:09:26.266945 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.266966 kubelet[2597]: W0212 22:09:26.266952 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.267035 kubelet[2597]: E0212 22:09:26.266968 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.267070 kubelet[2597]: E0212 22:09:26.267050 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.267070 kubelet[2597]: W0212 22:09:26.267056 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.267070 kubelet[2597]: E0212 22:09:26.267066 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.267165 kubelet[2597]: E0212 22:09:26.267157 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.267165 kubelet[2597]: W0212 22:09:26.267164 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.267239 kubelet[2597]: E0212 22:09:26.267174 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.267289 kubelet[2597]: E0212 22:09:26.267282 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.267289 kubelet[2597]: W0212 22:09:26.267288 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.267347 kubelet[2597]: E0212 22:09:26.267298 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.267443 kubelet[2597]: E0212 22:09:26.267436 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.267443 kubelet[2597]: W0212 22:09:26.267443 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.267536 kubelet[2597]: E0212 22:09:26.267453 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.267597 kubelet[2597]: E0212 22:09:26.267587 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.267650 kubelet[2597]: W0212 22:09:26.267599 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.267650 kubelet[2597]: E0212 22:09:26.267618 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.267776 kubelet[2597]: E0212 22:09:26.267766 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.267776 kubelet[2597]: W0212 22:09:26.267775 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.267874 kubelet[2597]: E0212 22:09:26.267793 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.267930 kubelet[2597]: E0212 22:09:26.267918 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.267981 kubelet[2597]: W0212 22:09:26.267934 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.267981 kubelet[2597]: E0212 22:09:26.267950 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.268077 kubelet[2597]: E0212 22:09:26.268068 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.268077 kubelet[2597]: W0212 22:09:26.268077 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.268172 kubelet[2597]: E0212 22:09:26.268095 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.268252 kubelet[2597]: E0212 22:09:26.268243 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.268252 kubelet[2597]: W0212 22:09:26.268251 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.268345 kubelet[2597]: E0212 22:09:26.268267 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.268397 kubelet[2597]: E0212 22:09:26.268387 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.268447 kubelet[2597]: W0212 22:09:26.268400 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.268447 kubelet[2597]: E0212 22:09:26.268414 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.268637 kubelet[2597]: E0212 22:09:26.268627 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.268637 kubelet[2597]: W0212 22:09:26.268636 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.268713 kubelet[2597]: E0212 22:09:26.268650 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.367654 kubelet[2597]: E0212 22:09:26.367492 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.367654 kubelet[2597]: W0212 22:09:26.367529 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.367654 kubelet[2597]: E0212 22:09:26.367571 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.368249 kubelet[2597]: E0212 22:09:26.368138 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.368249 kubelet[2597]: W0212 22:09:26.368169 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.368249 kubelet[2597]: E0212 22:09:26.368217 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.368772 kubelet[2597]: E0212 22:09:26.368723 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.368772 kubelet[2597]: W0212 22:09:26.368759 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.369108 kubelet[2597]: E0212 22:09:26.368806 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.381559 kubelet[2597]: E0212 22:09:26.381472 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.381559 kubelet[2597]: W0212 22:09:26.381512 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.381559 kubelet[2597]: E0212 22:09:26.381565 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.470352 kubelet[2597]: E0212 22:09:26.470287 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.470352 kubelet[2597]: W0212 22:09:26.470325 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.470352 kubelet[2597]: E0212 22:09:26.470365 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.471000 kubelet[2597]: E0212 22:09:26.470855 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.471000 kubelet[2597]: W0212 22:09:26.470879 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.471000 kubelet[2597]: E0212 22:09:26.470918 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.567247 env[1477]: time="2024-02-12T22:09:26.567165247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-fd657d7b4-bhlwt,Uid:8c89dde3-2f56-4018-a6ea-712eefb29958,Namespace:calico-system,Attempt:0,}" Feb 12 22:09:26.572061 kubelet[2597]: E0212 22:09:26.572018 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.572061 kubelet[2597]: W0212 22:09:26.572050 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.573551 kubelet[2597]: E0212 22:09:26.572090 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.573551 kubelet[2597]: E0212 22:09:26.572587 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.573551 kubelet[2597]: W0212 22:09:26.572617 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.573551 kubelet[2597]: E0212 22:09:26.572651 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.581327 kubelet[2597]: E0212 22:09:26.581274 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.581327 kubelet[2597]: W0212 22:09:26.581310 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.581755 kubelet[2597]: E0212 22:09:26.581348 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.587266 env[1477]: time="2024-02-12T22:09:26.587177701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-74w6s,Uid:c39a1510-2261-49b3-b0ed-7fc9ad35ad1c,Namespace:calico-system,Attempt:0,}" Feb 12 22:09:26.592376 env[1477]: time="2024-02-12T22:09:26.592232548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:09:26.592376 env[1477]: time="2024-02-12T22:09:26.592331443Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:09:26.592772 env[1477]: time="2024-02-12T22:09:26.592387914Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:09:26.592978 env[1477]: time="2024-02-12T22:09:26.592810653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c9214b2a6e083e6d9b602d4338d724e3f46a7a6892a2746028f5f2708680a6f pid=3235 runtime=io.containerd.runc.v2 Feb 12 22:09:26.607539 env[1477]: time="2024-02-12T22:09:26.607417443Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:09:26.607539 env[1477]: time="2024-02-12T22:09:26.607498015Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:09:26.607867 env[1477]: time="2024-02-12T22:09:26.607537845Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:09:26.607867 env[1477]: time="2024-02-12T22:09:26.607775406Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/88a2460b1222a8dd557ce41586b28cba3f2f7a8ff33bb7c7dbf62dffc7bb50d7 pid=3257 runtime=io.containerd.runc.v2 Feb 12 22:09:26.614836 systemd[1]: Started cri-containerd-8c9214b2a6e083e6d9b602d4338d724e3f46a7a6892a2746028f5f2708680a6f.scope. Feb 12 22:09:26.618340 sshd[3091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.83.149 user=root Feb 12 22:09:26.617000 audit[3091]: USER_AUTH pid=3091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.95.83.149 addr=150.95.83.149 terminal=ssh res=failed' Feb 12 22:09:26.623436 systemd[1]: Started cri-containerd-88a2460b1222a8dd557ce41586b28cba3f2f7a8ff33bb7c7dbf62dffc7bb50d7.scope. Feb 12 22:09:26.645224 kernel: kauditd_printk_skb: 355 callbacks suppressed Feb 12 22:09:26.645289 kernel: audit: type=1100 audit(1707775766.617:1089): pid=3091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.95.83.149 addr=150.95.83.149 terminal=ssh res=failed' Feb 12 22:09:26.673704 kubelet[2597]: E0212 22:09:26.673690 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.673704 kubelet[2597]: W0212 22:09:26.673700 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.673807 kubelet[2597]: E0212 22:09:26.673714 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.766357 kubelet[2597]: E0212 22:09:26.766285 2597 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:09:26.766357 kubelet[2597]: W0212 22:09:26.766303 2597 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:09:26.766357 kubelet[2597]: E0212 22:09:26.766320 2597 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:09:26.797163 kernel: audit: type=1400 audit(1707775766.626:1090): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.797236 kernel: audit: type=1400 audit(1707775766.626:1091): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.924163 kernel: audit: type=1400 audit(1707775766.626:1092): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.924220 kernel: audit: type=1400 audit(1707775766.626:1093): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.988247 kernel: audit: type=1400 audit(1707775766.626:1094): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.988286 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:09:26.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.732000 audit: BPF prog-id=127 op=LOAD Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3235 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:26.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863393231346232613665303833653664396236303264343333386437 Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3235 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:26.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863393231346232613665303833653664396236303264343333386437 Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.052926 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:09:27.052942 kernel: audit: audit_lost=8 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 22:09:27.052953 kernel: audit: backlog limit exceeded Feb 12 22:09:26.733000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.733000 audit: BPF prog-id=128 op=LOAD Feb 12 22:09:26.733000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001c0ac0 items=0 ppid=3235 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:26.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863393231346232613665303833653664396236303264343333386437 Feb 12 22:09:26.859000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.859000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.859000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.859000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.859000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.859000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.859000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.859000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit: BPF prog-id=129 op=LOAD Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3257 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:26.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838613234363062313232326138646435353763653431353836623238 Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3257 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:26.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838613234363062313232326138646435353763653431353836623238 Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.923000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.859000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.003000 audit[3323]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3323 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:09:27.003000 audit[3323]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe0689ad30 a2=0 a3=7ffe0689ad1c items=0 ppid=2903 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:27.003000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:09:26.923000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d5ce0 items=0 ppid=3257 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:26.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838613234363062313232326138646435353763653431353836623238 Feb 12 22:09:27.051000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.051000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.051000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.051000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.051000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.051000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.051000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.051000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.051000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.051000 audit: BPF prog-id=132 op=LOAD Feb 12 22:09:27.051000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d5d28 items=0 ppid=3257 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:27.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838613234363062313232326138646435353763653431353836623238 Feb 12 22:09:27.105000 audit: BPF prog-id=132 op=UNLOAD Feb 12 22:09:27.105000 audit: BPF prog-id=131 op=UNLOAD Feb 12 22:09:27.105000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.105000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.105000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.105000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.105000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.105000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.105000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.105000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.105000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:26.859000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001c0b08 items=0 ppid=3235 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:26.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863393231346232613665303833653664396236303264343333386437 Feb 12 22:09:27.105000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.105000 audit: BPF prog-id=133 op=LOAD Feb 12 22:09:27.105000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003bc138 items=0 ppid=3257 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:27.157000 audit: BPF prog-id=130 op=UNLOAD Feb 12 22:09:27.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838613234363062313232326138646435353763653431353836623238 Feb 12 22:09:27.157000 audit: BPF prog-id=128 op=UNLOAD Feb 12 22:09:27.157000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.157000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.157000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.157000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.157000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.157000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.157000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.157000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.157000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.157000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:27.157000 audit: BPF prog-id=134 op=LOAD Feb 12 22:09:27.157000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001c0f18 items=0 ppid=3235 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:27.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863393231346232613665303833653664396236303264343333386437 Feb 12 22:09:27.162670 env[1477]: time="2024-02-12T22:09:27.162637987Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-74w6s,Uid:c39a1510-2261-49b3-b0ed-7fc9ad35ad1c,Namespace:calico-system,Attempt:0,} returns sandbox id \"88a2460b1222a8dd557ce41586b28cba3f2f7a8ff33bb7c7dbf62dffc7bb50d7\"" Feb 12 22:09:27.163365 env[1477]: time="2024-02-12T22:09:27.163351126Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 22:09:27.051000 audit[3323]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3323 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:09:27.051000 audit[3323]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe0689ad30 a2=0 a3=7ffe0689ad1c items=0 ppid=2903 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:27.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:09:27.174199 env[1477]: time="2024-02-12T22:09:27.174144159Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-fd657d7b4-bhlwt,Uid:8c89dde3-2f56-4018-a6ea-712eefb29958,Namespace:calico-system,Attempt:0,} returns sandbox id \"8c9214b2a6e083e6d9b602d4338d724e3f46a7a6892a2746028f5f2708680a6f\"" Feb 12 22:09:28.256616 kubelet[2597]: E0212 22:09:28.256524 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:28.854059 sshd[3091]: Failed password for root from 150.95.83.149 port 44072 ssh2 Feb 12 22:09:30.256252 kubelet[2597]: E0212 22:09:30.256160 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:30.635990 sshd[3091]: Received disconnect from 150.95.83.149 port 44072:11: Bye Bye [preauth] Feb 12 22:09:30.635990 sshd[3091]: Disconnected from authenticating user root 150.95.83.149 port 44072 [preauth] Feb 12 22:09:30.638271 systemd[1]: sshd@8-147.75.49.97:22-150.95.83.149:44072.service: Deactivated successfully. Feb 12 22:09:30.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.49.97:22-150.95.83.149:44072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:32.255687 kubelet[2597]: E0212 22:09:32.255579 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:34.256308 kubelet[2597]: E0212 22:09:34.256207 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:36.137123 env[1477]: time="2024-02-12T22:09:36.137073214Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:36.137730 env[1477]: time="2024-02-12T22:09:36.137689045Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:36.139143 env[1477]: time="2024-02-12T22:09:36.139092207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:36.140149 env[1477]: time="2024-02-12T22:09:36.140109929Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:09:36.141142 env[1477]: time="2024-02-12T22:09:36.141099732Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 22:09:36.141439 env[1477]: time="2024-02-12T22:09:36.141427715Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 22:09:36.142061 env[1477]: time="2024-02-12T22:09:36.142048345Z" level=info msg="CreateContainer within sandbox \"88a2460b1222a8dd557ce41586b28cba3f2f7a8ff33bb7c7dbf62dffc7bb50d7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 22:09:36.146893 env[1477]: time="2024-02-12T22:09:36.146852461Z" level=info msg="CreateContainer within sandbox \"88a2460b1222a8dd557ce41586b28cba3f2f7a8ff33bb7c7dbf62dffc7bb50d7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"349c02da38cc95bb66dead6a626d65200bff64910a6a7018db4d44531c4764e6\"" Feb 12 22:09:36.147142 env[1477]: time="2024-02-12T22:09:36.147128616Z" level=info msg="StartContainer for \"349c02da38cc95bb66dead6a626d65200bff64910a6a7018db4d44531c4764e6\"" Feb 12 22:09:36.157824 systemd[1]: Started cri-containerd-349c02da38cc95bb66dead6a626d65200bff64910a6a7018db4d44531c4764e6.scope. Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.190958 kernel: kauditd_printk_skb: 118 callbacks suppressed Feb 12 22:09:36.190994 kernel: audit: type=1400 audit(1707775776.163:1129): avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd1f02d8ed8 items=0 ppid=3257 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:36.255531 kubelet[2597]: E0212 22:09:36.255492 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:36.345292 kernel: audit: type=1300 audit(1707775776.163:1129): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd1f02d8ed8 items=0 ppid=3257 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:36.345326 kernel: audit: type=1327 audit(1707775776.163:1129): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396330326461333863633935626236366465616436613632366436 Feb 12 22:09:36.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396330326461333863633935626236366465616436613632366436 Feb 12 22:09:36.434484 kernel: audit: type=1400 audit(1707775776.163:1130): avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.495255 kernel: audit: type=1400 audit(1707775776.163:1130): avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.556110 kernel: audit: type=1400 audit(1707775776.163:1130): avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.617123 kernel: audit: type=1400 audit(1707775776.163:1130): avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.678421 kernel: audit: type=1400 audit(1707775776.163:1130): avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.683375 env[1477]: time="2024-02-12T22:09:36.683350654Z" level=info msg="StartContainer for \"349c02da38cc95bb66dead6a626d65200bff64910a6a7018db4d44531c4764e6\" returns successfully" Feb 12 22:09:36.739809 kernel: audit: type=1400 audit(1707775776.163:1130): avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.740085 systemd[1]: cri-containerd-349c02da38cc95bb66dead6a626d65200bff64910a6a7018db4d44531c4764e6.scope: Deactivated successfully. Feb 12 22:09:36.750102 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-349c02da38cc95bb66dead6a626d65200bff64910a6a7018db4d44531c4764e6-rootfs.mount: Deactivated successfully. Feb 12 22:09:36.801180 kernel: audit: type=1400 audit(1707775776.163:1130): avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.163000 audit: BPF prog-id=135 op=LOAD Feb 12 22:09:36.163000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002ec528 items=0 ppid=3257 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:36.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396330326461333863633935626236366465616436613632366436 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000197770 a2=78 a3=c0002ec578 items=0 ppid=3257 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:36.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396330326461333863633935626236366465616436613632366436 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.344000 audit: BPF prog-id=136 op=LOAD Feb 12 22:09:36.344000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=1 items=0 ppid=3257 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:36.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396330326461333863633935626236366465616436613632366436 Feb 12 22:09:36.494000 audit: BPF prog-id=136 op=UNLOAD Feb 12 22:09:36.494000 audit: BPF prog-id=135 op=UNLOAD Feb 12 22:09:36.494000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.494000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.494000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.494000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.494000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.494000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.494000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.494000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.494000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.494000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:09:36.494000 audit: BPF prog-id=137 op=LOAD Feb 12 22:09:36.494000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002ec608 items=0 ppid=3257 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:09:36.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334396330326461333863633935626236366465616436613632366436 Feb 12 22:09:36.871000 audit: BPF prog-id=137 op=UNLOAD Feb 12 22:09:37.018513 env[1477]: time="2024-02-12T22:09:37.018272303Z" level=info msg="shim disconnected" id=349c02da38cc95bb66dead6a626d65200bff64910a6a7018db4d44531c4764e6 Feb 12 22:09:37.018513 env[1477]: time="2024-02-12T22:09:37.018369739Z" level=warning msg="cleaning up after shim disconnected" id=349c02da38cc95bb66dead6a626d65200bff64910a6a7018db4d44531c4764e6 namespace=k8s.io Feb 12 22:09:37.018513 env[1477]: time="2024-02-12T22:09:37.018396592Z" level=info msg="cleaning up dead shim" Feb 12 22:09:37.033831 env[1477]: time="2024-02-12T22:09:37.033715480Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:09:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3383 runtime=io.containerd.runc.v2\n" Feb 12 22:09:38.256028 kubelet[2597]: E0212 22:09:38.255954 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:40.255413 kubelet[2597]: E0212 22:09:40.255317 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:40.577749 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2875765770.mount: Deactivated successfully. Feb 12 22:09:42.255555 kubelet[2597]: E0212 22:09:42.255485 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:44.255918 kubelet[2597]: E0212 22:09:44.255823 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:46.255515 kubelet[2597]: E0212 22:09:46.255425 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:48.256045 kubelet[2597]: E0212 22:09:48.255982 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:50.256218 kubelet[2597]: E0212 22:09:50.256122 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:52.256153 kubelet[2597]: E0212 22:09:52.256048 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:53.976536 systemd[1]: Started sshd@9-147.75.49.97:22-203.196.8.148:38420.service. Feb 12 22:09:53.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.49.97:22-203.196.8.148:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:54.002670 kernel: kauditd_printk_skb: 44 callbacks suppressed Feb 12 22:09:54.002754 kernel: audit: type=1130 audit(1707775793.975:1137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.49.97:22-203.196.8.148:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:54.255793 kubelet[2597]: E0212 22:09:54.255699 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:55.313732 sshd[3404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.196.8.148 user=root Feb 12 22:09:55.313000 audit[3404]: USER_AUTH pid=3404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:09:55.401102 kernel: audit: type=1100 audit(1707775795.313:1138): pid=3404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:09:56.255872 kubelet[2597]: E0212 22:09:56.255796 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:09:57.194185 sshd[3404]: Failed password for root from 203.196.8.148 port 38420 ssh2 Feb 12 22:09:57.453383 sshd[3404]: Received disconnect from 203.196.8.148 port 38420:11: Bye Bye [preauth] Feb 12 22:09:57.453383 sshd[3404]: Disconnected from authenticating user root 203.196.8.148 port 38420 [preauth] Feb 12 22:09:57.455767 systemd[1]: sshd@9-147.75.49.97:22-203.196.8.148:38420.service: Deactivated successfully. Feb 12 22:09:57.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.49.97:22-203.196.8.148:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:57.547050 kernel: audit: type=1131 audit(1707775797.455:1139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.49.97:22-203.196.8.148:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:09:58.255797 kubelet[2597]: E0212 22:09:58.255729 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:00.256224 kubelet[2597]: E0212 22:10:00.256066 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:02.255891 kubelet[2597]: E0212 22:10:02.255798 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:04.061000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.061000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00175b9b0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:10:04.255203 kubelet[2597]: E0212 22:10:04.255192 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:04.271197 kernel: audit: type=1400 audit(1707775804.061:1140): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.271226 kernel: audit: type=1300 audit(1707775804.061:1140): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00175b9b0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:10:04.271313 kernel: audit: type=1327 audit(1707775804.061:1140): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:10:04.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:10:04.361626 kernel: audit: type=1400 audit(1707775804.061:1141): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.061000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.061000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000385560 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:10:04.573172 kernel: audit: type=1300 audit(1707775804.061:1141): arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000385560 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:10:04.573201 kernel: audit: type=1327 audit(1707775804.061:1141): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:10:04.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:10:04.708000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.708000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00bf84900 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:10:04.904001 kernel: audit: type=1400 audit(1707775804.708:1142): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.904041 kernel: audit: type=1300 audit(1707775804.708:1142): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00bf84900 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:10:04.904058 kernel: audit: type=1327 audit(1707775804.708:1142): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:10:04.708000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:10:04.998293 kernel: audit: type=1400 audit(1707775804.708:1143): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.708000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.708000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c008fb5230 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:10:04.708000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:10:04.708000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.708000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013f79700 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:10:04.708000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:10:04.709000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.709000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00315e5c0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:10:04.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:10:04.710000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.710000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:04.710000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008fb5290 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:10:04.710000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00b2f0660 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:10:04.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:10:04.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:10:06.255707 kubelet[2597]: E0212 22:10:06.255609 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:07.448000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:07.448000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010751c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:10:07.448000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:10:07.450000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:07.450000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0005eaca0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:10:07.450000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:10:07.453000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:07.453000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0005eace0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:10:07.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:10:07.457000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:10:07.457000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018af8c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:10:07.457000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:10:08.256021 kubelet[2597]: E0212 22:10:08.255990 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:10.255632 kubelet[2597]: E0212 22:10:10.255533 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:12.255325 kubelet[2597]: E0212 22:10:12.255204 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:14.255961 kubelet[2597]: E0212 22:10:14.255830 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:14.457145 systemd[1]: Started sshd@10-147.75.49.97:22-43.156.170.69:52710.service. Feb 12 22:10:14.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.97:22-43.156.170.69:52710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:10:14.484799 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:10:14.484834 kernel: audit: type=1130 audit(1707775814.456:1152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.97:22-43.156.170.69:52710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:10:15.537371 sshd[3412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.170.69 user=root Feb 12 22:10:15.536000 audit[3412]: USER_AUTH pid=3412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.170.69 addr=43.156.170.69 terminal=ssh res=failed' Feb 12 22:10:15.628127 kernel: audit: type=1100 audit(1707775815.536:1153): pid=3412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.170.69 addr=43.156.170.69 terminal=ssh res=failed' Feb 12 22:10:16.255352 kubelet[2597]: E0212 22:10:16.255230 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:18.166112 sshd[3412]: Failed password for root from 43.156.170.69 port 52710 ssh2 Feb 12 22:10:18.255841 kubelet[2597]: E0212 22:10:18.255728 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:19.525101 sshd[3412]: Received disconnect from 43.156.170.69 port 52710:11: Bye Bye [preauth] Feb 12 22:10:19.525101 sshd[3412]: Disconnected from authenticating user root 43.156.170.69 port 52710 [preauth] Feb 12 22:10:19.527621 systemd[1]: sshd@10-147.75.49.97:22-43.156.170.69:52710.service: Deactivated successfully. Feb 12 22:10:19.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.97:22-43.156.170.69:52710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:10:19.620133 kernel: audit: type=1131 audit(1707775819.527:1154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.97:22-43.156.170.69:52710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:10:20.255661 kubelet[2597]: E0212 22:10:20.255586 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:22.255848 kubelet[2597]: E0212 22:10:22.255738 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:24.255648 kubelet[2597]: E0212 22:10:24.255546 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:26.256236 kubelet[2597]: E0212 22:10:26.256117 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:28.256424 kubelet[2597]: E0212 22:10:28.256370 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:30.255983 kubelet[2597]: E0212 22:10:30.255869 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:30.431735 systemd[1]: Started sshd@11-147.75.49.97:22-150.95.83.149:34574.service. Feb 12 22:10:30.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.97:22-150.95.83.149:34574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:10:30.522933 kernel: audit: type=1130 audit(1707775830.431:1155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.97:22-150.95.83.149:34574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:10:31.610776 sshd[3419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.83.149 user=root Feb 12 22:10:31.610000 audit[3419]: ANOM_LOGIN_FAILURES pid=3419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 12 22:10:31.611031 sshd[3419]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 12 22:10:31.610000 audit[3419]: USER_AUTH pid=3419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.95.83.149 addr=150.95.83.149 terminal=ssh res=failed' Feb 12 22:10:31.772173 kernel: audit: type=2100 audit(1707775831.610:1156): pid=3419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 12 22:10:31.772226 kernel: audit: type=1100 audit(1707775831.610:1157): pid=3419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.95.83.149 addr=150.95.83.149 terminal=ssh res=failed' Feb 12 22:10:32.255612 kubelet[2597]: E0212 22:10:32.255499 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:33.436172 sshd[3419]: Failed password for root from 150.95.83.149 port 34574 ssh2 Feb 12 22:10:33.721662 sshd[3419]: Received disconnect from 150.95.83.149 port 34574:11: Bye Bye [preauth] Feb 12 22:10:33.721662 sshd[3419]: Disconnected from authenticating user root 150.95.83.149 port 34574 [preauth] Feb 12 22:10:33.724253 systemd[1]: sshd@11-147.75.49.97:22-150.95.83.149:34574.service: Deactivated successfully. Feb 12 22:10:33.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.97:22-150.95.83.149:34574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:10:33.816992 kernel: audit: type=1131 audit(1707775833.723:1158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.97:22-150.95.83.149:34574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:10:34.255602 kubelet[2597]: E0212 22:10:34.255501 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:36.255548 kubelet[2597]: E0212 22:10:36.255472 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:38.256352 kubelet[2597]: E0212 22:10:38.256272 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:40.256450 kubelet[2597]: E0212 22:10:40.256337 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:42.255278 kubelet[2597]: E0212 22:10:42.255172 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:44.255676 kubelet[2597]: E0212 22:10:44.255573 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:46.256303 kubelet[2597]: E0212 22:10:46.256196 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:48.255440 kubelet[2597]: E0212 22:10:48.255392 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:50.256641 kubelet[2597]: E0212 22:10:50.256557 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:52.255387 kubelet[2597]: E0212 22:10:52.255275 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:54.255747 kubelet[2597]: E0212 22:10:54.255640 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:56.256221 kubelet[2597]: E0212 22:10:56.256101 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:10:58.256493 kubelet[2597]: E0212 22:10:58.256436 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:00.256233 kubelet[2597]: E0212 22:11:00.256131 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:02.255710 kubelet[2597]: E0212 22:11:02.255629 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:04.062000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.062000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024d8600 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:11:04.255395 kubelet[2597]: E0212 22:11:04.255356 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:04.283071 kernel: audit: type=1400 audit(1707775864.062:1159): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.283149 kernel: audit: type=1300 audit(1707775864.062:1159): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024d8600 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:11:04.283165 kernel: audit: type=1327 audit(1707775864.062:1159): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:11:04.062000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:11:04.377489 kernel: audit: type=1400 audit(1707775864.062:1160): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.062000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.468168 kernel: audit: type=1300 audit(1707775864.062:1160): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0022474a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:11:04.062000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0022474a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:11:04.590904 kernel: audit: type=1327 audit(1707775864.062:1160): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:11:04.062000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:11:04.708000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.708000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00bbe0150 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:11:04.902739 kernel: audit: type=1400 audit(1707775864.708:1161): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.902781 kernel: audit: type=1300 audit(1707775864.708:1161): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00bbe0150 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:11:04.902803 kernel: audit: type=1327 audit(1707775864.708:1161): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:11:04.708000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:11:04.997194 kernel: audit: type=1400 audit(1707775864.709:1162): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.709000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.709000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00bcd5e30 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:11:04.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:11:04.709000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.709000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00babe7c0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:11:04.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:11:04.710000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.710000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002f1e380 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:11:04.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:11:04.710000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.710000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0142e9f20 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:11:04.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:11:04.710000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:04.710000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00c62b8f0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:11:04.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:11:06.255337 kubelet[2597]: E0212 22:11:06.255268 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:07.449000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:07.449000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0022475c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:11:07.449000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:11:07.451000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:07.451000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024131c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:11:07.451000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:11:07.454000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:07.454000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0022476e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:11:07.454000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:11:07.458000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:11:07.458000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024a75c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:11:07.458000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:11:08.255327 kubelet[2597]: E0212 22:11:08.255302 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:08.323246 kubelet[2597]: E0212 22:11:08.323156 2597 kubelet_node_status.go:452] "Node not becoming ready in time after startup" Feb 12 22:11:10.255320 kubelet[2597]: E0212 22:11:10.255258 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:12.256004 kubelet[2597]: E0212 22:11:12.255892 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:13.297413 kubelet[2597]: E0212 22:11:13.297338 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:11:14.255700 kubelet[2597]: E0212 22:11:14.255594 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:16.256772 kubelet[2597]: E0212 22:11:16.256680 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:18.256855 kubelet[2597]: E0212 22:11:18.256744 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:18.299557 kubelet[2597]: E0212 22:11:18.299484 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:11:19.300650 systemd[1]: Started sshd@12-147.75.49.97:22-43.156.170.69:43338.service. Feb 12 22:11:19.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.97:22-43.156.170.69:43338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:19.328581 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:11:19.328645 kernel: audit: type=1130 audit(1707775879.300:1171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.97:22-43.156.170.69:43338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:20.256095 kubelet[2597]: E0212 22:11:20.255986 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:20.342860 sshd[3429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.170.69 user=root Feb 12 22:11:20.342000 audit[3429]: ANOM_LOGIN_FAILURES pid=3429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:20.343138 sshd[3429]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 12 22:11:20.342000 audit[3429]: USER_AUTH pid=3429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.170.69 addr=43.156.170.69 terminal=ssh res=failed' Feb 12 22:11:20.496322 kernel: audit: type=2100 audit(1707775880.342:1172): pid=3429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:20.496352 kernel: audit: type=1100 audit(1707775880.342:1173): pid=3429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.170.69 addr=43.156.170.69 terminal=ssh res=failed' Feb 12 22:11:21.113780 systemd[1]: Started sshd@13-147.75.49.97:22-203.196.8.148:60732.service. Feb 12 22:11:21.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.97:22-203.196.8.148:60732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:21.205011 kernel: audit: type=1130 audit(1707775881.112:1174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.97:22-203.196.8.148:60732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:22.256291 kubelet[2597]: E0212 22:11:22.256180 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:22.437258 sshd[3432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.196.8.148 user=root Feb 12 22:11:22.436000 audit[3432]: USER_AUTH pid=3432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:11:22.528120 kernel: audit: type=1100 audit(1707775882.436:1175): pid=3432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:11:22.896145 sshd[3429]: Failed password for root from 43.156.170.69 port 43338 ssh2 Feb 12 22:11:23.301198 kubelet[2597]: E0212 22:11:23.301135 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:11:24.255706 kubelet[2597]: E0212 22:11:24.255606 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:24.333056 sshd[3429]: Received disconnect from 43.156.170.69 port 43338:11: Bye Bye [preauth] Feb 12 22:11:24.333056 sshd[3429]: Disconnected from authenticating user root 43.156.170.69 port 43338 [preauth] Feb 12 22:11:24.335505 systemd[1]: sshd@12-147.75.49.97:22-43.156.170.69:43338.service: Deactivated successfully. Feb 12 22:11:24.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.97:22-43.156.170.69:43338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:24.427991 kernel: audit: type=1131 audit(1707775884.335:1176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.97:22-43.156.170.69:43338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:24.930185 sshd[3432]: Failed password for root from 203.196.8.148 port 60732 ssh2 Feb 12 22:11:26.255344 kubelet[2597]: E0212 22:11:26.255296 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:26.481264 sshd[3432]: Received disconnect from 203.196.8.148 port 60732:11: Bye Bye [preauth] Feb 12 22:11:26.481264 sshd[3432]: Disconnected from authenticating user root 203.196.8.148 port 60732 [preauth] Feb 12 22:11:26.483783 systemd[1]: sshd@13-147.75.49.97:22-203.196.8.148:60732.service: Deactivated successfully. Feb 12 22:11:26.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.97:22-203.196.8.148:60732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:26.577129 kernel: audit: type=1131 audit(1707775886.483:1177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.97:22-203.196.8.148:60732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:28.256269 kubelet[2597]: E0212 22:11:28.256170 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:28.303137 kubelet[2597]: E0212 22:11:28.303082 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:11:30.255852 kubelet[2597]: E0212 22:11:30.255622 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:32.255400 kubelet[2597]: E0212 22:11:32.255300 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:33.304376 kubelet[2597]: E0212 22:11:33.304279 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:11:34.256197 kubelet[2597]: E0212 22:11:34.256081 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:36.019793 systemd[1]: Started sshd@14-147.75.49.97:22-150.95.83.149:53310.service. Feb 12 22:11:36.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.97:22-150.95.83.149:53310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:36.112001 kernel: audit: type=1130 audit(1707775896.019:1178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.97:22-150.95.83.149:53310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:36.256228 kubelet[2597]: E0212 22:11:36.256126 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:37.192877 sshd[3439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.83.149 user=root Feb 12 22:11:37.192000 audit[3439]: USER_AUTH pid=3439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.95.83.149 addr=150.95.83.149 terminal=ssh res=failed' Feb 12 22:11:37.285116 kernel: audit: type=1100 audit(1707775897.192:1179): pid=3439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.95.83.149 addr=150.95.83.149 terminal=ssh res=failed' Feb 12 22:11:38.256726 kubelet[2597]: E0212 22:11:38.256602 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:38.305497 kubelet[2597]: E0212 22:11:38.305406 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:11:39.078664 sshd[3439]: Failed password for root from 150.95.83.149 port 53310 ssh2 Feb 12 22:11:39.296384 sshd[3439]: Received disconnect from 150.95.83.149 port 53310:11: Bye Bye [preauth] Feb 12 22:11:39.296384 sshd[3439]: Disconnected from authenticating user root 150.95.83.149 port 53310 [preauth] Feb 12 22:11:39.298965 systemd[1]: sshd@14-147.75.49.97:22-150.95.83.149:53310.service: Deactivated successfully. Feb 12 22:11:39.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.97:22-150.95.83.149:53310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:39.393129 kernel: audit: type=1131 audit(1707775899.298:1180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.97:22-150.95.83.149:53310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:11:40.255720 kubelet[2597]: E0212 22:11:40.255612 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:42.255379 kubelet[2597]: E0212 22:11:42.255278 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:43.307646 kubelet[2597]: E0212 22:11:43.307542 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:11:44.255504 kubelet[2597]: E0212 22:11:44.255388 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:46.256357 kubelet[2597]: E0212 22:11:46.256255 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:48.255523 kubelet[2597]: E0212 22:11:48.255473 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:48.309518 kubelet[2597]: E0212 22:11:48.309410 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:11:50.256244 kubelet[2597]: E0212 22:11:50.256127 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:52.256246 kubelet[2597]: E0212 22:11:52.256169 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:53.311204 kubelet[2597]: E0212 22:11:53.311154 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:11:54.255859 kubelet[2597]: E0212 22:11:54.255787 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:56.256153 kubelet[2597]: E0212 22:11:56.256084 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:58.256819 kubelet[2597]: E0212 22:11:58.256719 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:11:58.312586 kubelet[2597]: E0212 22:11:58.312501 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:00.255256 kubelet[2597]: E0212 22:12:00.255206 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:02.256375 kubelet[2597]: E0212 22:12:02.256256 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:03.313823 kubelet[2597]: E0212 22:12:03.313707 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:04.063000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.063000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001839860 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:12:04.255678 kubelet[2597]: E0212 22:12:04.255624 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:04.280406 kernel: audit: type=1400 audit(1707775924.063:1181): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.280479 kernel: audit: type=1300 audit(1707775924.063:1181): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001839860 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:12:04.280494 kernel: audit: type=1327 audit(1707775924.063:1181): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:12:04.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:12:04.376677 kernel: audit: type=1400 audit(1707775924.063:1182): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.063000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.468464 kernel: audit: type=1300 audit(1707775924.063:1182): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0026fd710 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:12:04.063000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0026fd710 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:12:04.591521 kernel: audit: type=1327 audit(1707775924.063:1182): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:12:04.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:12:04.709000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.709000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00adb3320 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:12:04.903002 kernel: audit: type=1400 audit(1707775924.709:1183): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.903091 kernel: audit: type=1300 audit(1707775924.709:1183): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00adb3320 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:12:04.903107 kernel: audit: type=1327 audit(1707775924.709:1183): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:12:04.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:12:04.999138 kernel: audit: type=1400 audit(1707775924.710:1184): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.710000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.710000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002f16840 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:12:04.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:12:04.710000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.710000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00bda0b10 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:12:04.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:12:04.710000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.710000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002ec5140 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:12:04.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:12:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c008550ba0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:12:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:12:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00fa49110 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:12:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:12:06.255974 kubelet[2597]: E0212 22:12:06.255870 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:07.449000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:07.449000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a2f2e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:12:07.449000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:12:07.452000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:07.452000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028bafa0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:12:07.452000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:12:07.454000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:07.454000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001253ea0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:12:07.454000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:12:07.459000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:12:07.459000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028bb0c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:12:07.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:12:08.256081 kubelet[2597]: E0212 22:12:08.255984 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:08.315129 kubelet[2597]: E0212 22:12:08.315039 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:10.255913 kubelet[2597]: E0212 22:12:10.255810 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:12.255943 kubelet[2597]: E0212 22:12:12.255854 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:13.316621 kubelet[2597]: E0212 22:12:13.316529 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:14.255996 kubelet[2597]: E0212 22:12:14.255889 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:16.255963 kubelet[2597]: E0212 22:12:16.255833 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:18.256158 kubelet[2597]: E0212 22:12:18.256080 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:18.318460 kubelet[2597]: E0212 22:12:18.318359 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:20.255840 kubelet[2597]: E0212 22:12:20.255720 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:22.255898 kubelet[2597]: E0212 22:12:22.255803 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:23.319815 kubelet[2597]: E0212 22:12:23.319707 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:24.255685 kubelet[2597]: E0212 22:12:24.255574 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:26.255754 kubelet[2597]: E0212 22:12:26.255643 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:28.255899 kubelet[2597]: E0212 22:12:28.255790 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:28.321552 kubelet[2597]: E0212 22:12:28.321499 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:30.256373 kubelet[2597]: E0212 22:12:30.256297 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:32.255546 kubelet[2597]: E0212 22:12:32.255455 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:33.323385 kubelet[2597]: E0212 22:12:33.323289 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:34.256264 kubelet[2597]: E0212 22:12:34.256188 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:36.255444 kubelet[2597]: E0212 22:12:36.255329 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:38.256450 kubelet[2597]: E0212 22:12:38.256376 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:38.325405 kubelet[2597]: E0212 22:12:38.325298 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:40.255581 kubelet[2597]: E0212 22:12:40.255450 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:42.256098 kubelet[2597]: E0212 22:12:42.255969 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:43.326860 kubelet[2597]: E0212 22:12:43.326808 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:44.255700 kubelet[2597]: E0212 22:12:44.255593 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:46.256228 kubelet[2597]: E0212 22:12:46.256121 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:48.256672 kubelet[2597]: E0212 22:12:48.256556 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:48.318607 systemd[1]: Started sshd@15-147.75.49.97:22-203.196.8.148:54810.service. Feb 12 22:12:48.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.97:22-203.196.8.148:54810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:48.327272 kubelet[2597]: E0212 22:12:48.327221 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:48.345836 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:12:48.345871 kernel: audit: type=1130 audit(1707775968.317:1193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.97:22-203.196.8.148:54810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.645985 sshd[3450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.196.8.148 user=root Feb 12 22:12:49.645000 audit[3450]: USER_AUTH pid=3450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:12:49.736926 kernel: audit: type=1100 audit(1707775969.645:1194): pid=3450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:12:50.255616 kubelet[2597]: E0212 22:12:50.255537 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:51.416430 sshd[3450]: Failed password for root from 203.196.8.148 port 54810 ssh2 Feb 12 22:12:51.784540 sshd[3450]: Received disconnect from 203.196.8.148 port 54810:11: Bye Bye [preauth] Feb 12 22:12:51.784540 sshd[3450]: Disconnected from authenticating user root 203.196.8.148 port 54810 [preauth] Feb 12 22:12:51.787095 systemd[1]: sshd@15-147.75.49.97:22-203.196.8.148:54810.service: Deactivated successfully. Feb 12 22:12:51.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.97:22-203.196.8.148:54810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.880022 kernel: audit: type=1131 audit(1707775971.786:1195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.97:22-203.196.8.148:54810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.255729 kubelet[2597]: E0212 22:12:52.255632 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:53.328837 kubelet[2597]: E0212 22:12:53.328766 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:12:54.255979 kubelet[2597]: E0212 22:12:54.255881 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:56.255273 kubelet[2597]: E0212 22:12:56.255201 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:58.256050 kubelet[2597]: E0212 22:12:58.255958 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:12:58.330749 kubelet[2597]: E0212 22:12:58.330650 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:00.256424 kubelet[2597]: E0212 22:13:00.256266 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:02.256077 kubelet[2597]: E0212 22:13:02.256027 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:03.332538 kubelet[2597]: E0212 22:13:03.332426 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:04.065000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.065000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001779420 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:13:04.255579 kubelet[2597]: E0212 22:13:04.255540 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:04.282192 kernel: audit: type=1400 audit(1707775984.065:1196): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.282231 kernel: audit: type=1300 audit(1707775984.065:1196): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001779420 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:13:04.282248 kernel: audit: type=1327 audit(1707775984.065:1196): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:13:04.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:13:04.375652 kernel: audit: type=1400 audit(1707775984.065:1197): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.065000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.466851 kernel: audit: type=1300 audit(1707775984.065:1197): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002696990 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:13:04.065000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002696990 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:13:04.587492 kernel: audit: type=1327 audit(1707775984.065:1197): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:13:04.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:13:04.710000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.710000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00b0482d0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:13:04.901800 kernel: audit: type=1400 audit(1707775984.710:1198): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.901867 kernel: audit: type=1300 audit(1707775984.710:1198): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00b0482d0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:13:04.901883 kernel: audit: type=1327 audit(1707775984.710:1198): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:13:04.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:13:04.996639 kernel: audit: type=1400 audit(1707775984.711:1199): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01049ee40 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:13:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:13:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a176990 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:13:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:13:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00374a100 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:13:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:13:04.712000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.712000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c008faf800 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:13:04.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:13:04.712000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:04.712000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008faf830 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:13:04.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:13:06.256121 kubelet[2597]: E0212 22:13:06.256014 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:07.451000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:07.451000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b9020 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:13:07.451000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:13:07.452000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:07.452000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b9040 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:13:07.452000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:13:07.455000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:07.455000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001779540 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:13:07.455000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:13:07.459000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:13:07.459000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006faf80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:13:07.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:13:07.790585 systemd[1]: Started sshd@16-147.75.49.97:22-141.98.11.11:28996.service. Feb 12 22:13:07.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.49.97:22-141.98.11.11:28996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:13:08.256035 kubelet[2597]: E0212 22:13:08.255908 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:08.333689 kubelet[2597]: E0212 22:13:08.333579 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:08.714646 sshd[3457]: Invalid user admin from 141.98.11.11 port 28996 Feb 12 22:13:08.921413 sshd[3457]: pam_faillock(sshd:auth): User unknown Feb 12 22:13:08.922560 sshd[3457]: pam_unix(sshd:auth): check pass; user unknown Feb 12 22:13:08.922654 sshd[3457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.11 Feb 12 22:13:08.923620 sshd[3457]: pam_faillock(sshd:auth): User unknown Feb 12 22:13:08.922000 audit[3457]: USER_AUTH pid=3457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 12 22:13:10.256126 kubelet[2597]: E0212 22:13:10.256021 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:10.969683 sshd[3457]: Failed password for invalid user admin from 141.98.11.11 port 28996 ssh2 Feb 12 22:13:11.150856 sshd[3457]: Connection closed by invalid user admin 141.98.11.11 port 28996 [preauth] Feb 12 22:13:11.153452 systemd[1]: sshd@16-147.75.49.97:22-141.98.11.11:28996.service: Deactivated successfully. Feb 12 22:13:11.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.49.97:22-141.98.11.11:28996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:13:11.181335 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 12 22:13:11.181369 kernel: audit: type=1131 audit(1707775991.153:1210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.49.97:22-141.98.11.11:28996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:13:12.256052 kubelet[2597]: E0212 22:13:12.255972 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:13.335269 kubelet[2597]: E0212 22:13:13.335163 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:14.255441 kubelet[2597]: E0212 22:13:14.255329 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:16.255282 kubelet[2597]: E0212 22:13:16.255198 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:18.256855 kubelet[2597]: E0212 22:13:18.256789 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:18.336987 kubelet[2597]: E0212 22:13:18.336885 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:20.256114 kubelet[2597]: E0212 22:13:20.256008 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:22.255651 kubelet[2597]: E0212 22:13:22.255546 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:23.338791 kubelet[2597]: E0212 22:13:23.338721 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:24.256384 kubelet[2597]: E0212 22:13:24.256264 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:26.255386 kubelet[2597]: E0212 22:13:26.255310 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:28.255296 kubelet[2597]: E0212 22:13:28.255274 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:28.340280 kubelet[2597]: E0212 22:13:28.340186 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:30.256393 kubelet[2597]: E0212 22:13:30.256287 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:32.255132 kubelet[2597]: E0212 22:13:32.255113 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:33.341830 kubelet[2597]: E0212 22:13:33.341732 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:34.255983 kubelet[2597]: E0212 22:13:34.255874 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:36.256112 kubelet[2597]: E0212 22:13:36.256035 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:38.256064 kubelet[2597]: E0212 22:13:38.255991 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:38.343192 kubelet[2597]: E0212 22:13:38.343123 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:40.255899 kubelet[2597]: E0212 22:13:40.255786 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:42.256281 kubelet[2597]: E0212 22:13:42.256184 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:43.345217 kubelet[2597]: E0212 22:13:43.345157 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:44.255986 kubelet[2597]: E0212 22:13:44.255899 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:46.255606 kubelet[2597]: E0212 22:13:46.255534 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:48.255368 kubelet[2597]: E0212 22:13:48.255318 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:48.346575 kubelet[2597]: E0212 22:13:48.346486 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:50.256014 kubelet[2597]: E0212 22:13:50.255886 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:52.255611 kubelet[2597]: E0212 22:13:52.255503 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:53.348299 kubelet[2597]: E0212 22:13:53.348229 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:13:54.255897 kubelet[2597]: E0212 22:13:54.255783 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:56.255962 kubelet[2597]: E0212 22:13:56.255887 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:58.257384 kubelet[2597]: E0212 22:13:58.257275 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:13:58.349796 kubelet[2597]: E0212 22:13:58.349712 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:00.255628 kubelet[2597]: E0212 22:14:00.255534 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:02.255982 kubelet[2597]: E0212 22:14:02.255873 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:03.351410 kubelet[2597]: E0212 22:14:03.351309 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:04.065000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.065000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089b2c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:14:04.255291 kubelet[2597]: E0212 22:14:04.255276 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:04.280800 kernel: audit: type=1400 audit(1707776044.065:1211): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.280850 kernel: audit: type=1300 audit(1707776044.065:1211): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089b2c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:14:04.280873 kernel: audit: type=1327 audit(1707776044.065:1211): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:04.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:04.375291 kernel: audit: type=1400 audit(1707776044.066:1212): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.066000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.468561 kernel: audit: type=1300 audit(1707776044.066:1212): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0018f74a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:14:04.066000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0018f74a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:14:04.588915 kernel: audit: type=1327 audit(1707776044.066:1212): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:04.066000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:04.710000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.710000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ba23950 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:14:04.901540 kernel: audit: type=1400 audit(1707776044.710:1213): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.901579 kernel: audit: type=1300 audit(1707776044.710:1213): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ba23950 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:14:04.901597 kernel: audit: type=1327 audit(1707776044.710:1213): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:14:04.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:14:04.996614 kernel: audit: type=1400 audit(1707776044.711:1214): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ba23ad0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:14:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:14:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00bad8280 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:14:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:14:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c002d3f8e0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:14:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:14:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a49fc50 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:14:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:14:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00a7b0c60 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:14:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:14:06.255452 kubelet[2597]: E0212 22:14:06.255345 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:07.452000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:07.452000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a2ef60 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:14:07.452000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:07.453000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:07.453000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a2efa0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:14:07.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:07.456000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:07.456000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018afd40 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:14:07.456000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:07.460000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:07.460000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d6f640 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:14:07.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:08.256149 kubelet[2597]: E0212 22:14:08.256097 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:08.353321 kubelet[2597]: E0212 22:14:08.353226 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:10.256269 kubelet[2597]: E0212 22:14:10.256200 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:12.255630 kubelet[2597]: E0212 22:14:12.255557 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:13.354669 kubelet[2597]: E0212 22:14:13.354571 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:14.255390 kubelet[2597]: E0212 22:14:14.255272 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:15.565584 systemd[1]: Started sshd@17-147.75.49.97:22-203.196.8.148:48890.service. Feb 12 22:14:15.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.97:22-203.196.8.148:48890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:15.592810 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:14:15.592875 kernel: audit: type=1130 audit(1707776055.564:1223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.97:22-203.196.8.148:48890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:16.255315 kubelet[2597]: E0212 22:14:16.255210 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:16.886344 sshd[3473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.196.8.148 user=root Feb 12 22:14:16.885000 audit[3473]: USER_AUTH pid=3473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:14:16.977133 kernel: audit: type=1100 audit(1707776056.885:1224): pid=3473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:14:18.255860 kubelet[2597]: E0212 22:14:18.255777 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:18.355988 kubelet[2597]: E0212 22:14:18.355910 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:18.932324 sshd[3473]: Failed password for root from 203.196.8.148 port 48890 ssh2 Feb 12 22:14:20.256211 kubelet[2597]: E0212 22:14:20.256130 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:20.926802 sshd[3473]: Received disconnect from 203.196.8.148 port 48890:11: Bye Bye [preauth] Feb 12 22:14:20.926802 sshd[3473]: Disconnected from authenticating user root 203.196.8.148 port 48890 [preauth] Feb 12 22:14:20.929362 systemd[1]: sshd@17-147.75.49.97:22-203.196.8.148:48890.service: Deactivated successfully. Feb 12 22:14:20.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.97:22-203.196.8.148:48890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:21.021002 kernel: audit: type=1131 audit(1707776060.928:1225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.97:22-203.196.8.148:48890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:22.256349 kubelet[2597]: E0212 22:14:22.256281 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:23.357802 kubelet[2597]: E0212 22:14:23.357700 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:24.256157 kubelet[2597]: E0212 22:14:24.256078 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:26.256139 kubelet[2597]: E0212 22:14:26.256036 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:28.255704 kubelet[2597]: E0212 22:14:28.255643 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:28.358985 kubelet[2597]: E0212 22:14:28.358916 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:30.255638 kubelet[2597]: E0212 22:14:30.255472 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:32.256334 kubelet[2597]: E0212 22:14:32.256234 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:33.360862 kubelet[2597]: E0212 22:14:33.360803 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:34.255476 kubelet[2597]: E0212 22:14:34.255370 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:36.255607 kubelet[2597]: E0212 22:14:36.255500 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:38.256076 kubelet[2597]: E0212 22:14:38.255996 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:38.362847 kubelet[2597]: E0212 22:14:38.362747 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:40.255287 kubelet[2597]: E0212 22:14:40.255205 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:42.255962 kubelet[2597]: E0212 22:14:42.255880 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:43.364716 kubelet[2597]: E0212 22:14:43.364627 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:44.255502 kubelet[2597]: E0212 22:14:44.255393 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:46.255576 kubelet[2597]: E0212 22:14:46.255467 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:48.255032 kubelet[2597]: E0212 22:14:48.254979 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:48.366565 kubelet[2597]: E0212 22:14:48.366453 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:50.255918 kubelet[2597]: E0212 22:14:50.255807 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:52.256120 kubelet[2597]: E0212 22:14:52.256012 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:53.368212 kubelet[2597]: E0212 22:14:53.368121 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:14:54.256209 kubelet[2597]: E0212 22:14:54.256094 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:56.256008 kubelet[2597]: E0212 22:14:56.255915 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:58.256169 kubelet[2597]: E0212 22:14:58.256102 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:14:58.369737 kubelet[2597]: E0212 22:14:58.369653 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:00.255852 kubelet[2597]: E0212 22:15:00.255744 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:02.255446 kubelet[2597]: E0212 22:15:02.255328 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:03.371064 kubelet[2597]: E0212 22:15:03.370957 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:04.066000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.066000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f203e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:15:04.255328 kubelet[2597]: E0212 22:15:04.255308 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:04.281469 kernel: audit: type=1400 audit(1707776104.066:1226): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.281528 kernel: audit: type=1300 audit(1707776104.066:1226): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f203e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:15:04.281591 kernel: audit: type=1327 audit(1707776104.066:1226): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:04.066000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:04.066000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.466710 kernel: audit: type=1400 audit(1707776104.066:1227): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.466761 kernel: audit: type=1300 audit(1707776104.066:1227): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0026960f0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:15:04.066000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0026960f0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:15:04.066000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:04.681691 kernel: audit: type=1327 audit(1707776104.066:1227): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0023ff440 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:15:04.905180 kernel: audit: type=1400 audit(1707776104.711:1228): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.905257 kernel: audit: type=1300 audit(1707776104.711:1228): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0023ff440 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:15:04.905288 kernel: audit: type=1327 audit(1707776104.711:1228): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:15:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:15:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:05.091009 kernel: audit: type=1400 audit(1707776104.711:1229): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c013169890 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:15:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:15:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00308a0e0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:15:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:15:04.711000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.711000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c012968940 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:15:04.711000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:15:04.714000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.714000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0023ff5f0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:15:04.714000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:15:04.714000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:04.714000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0023ff650 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:15:04.714000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:15:06.255757 kubelet[2597]: E0212 22:15:06.255639 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:07.452000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:07.452000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b92e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:15:07.452000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:07.454000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:07.454000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b9300 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:15:07.454000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:07.456000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:07.456000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001778f20 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:15:07.456000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:07.461000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:07.461000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b9440 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:15:07.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:08.256569 kubelet[2597]: E0212 22:15:08.256490 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:08.372969 kubelet[2597]: E0212 22:15:08.372869 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:10.255653 kubelet[2597]: E0212 22:15:10.255543 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:12.255966 kubelet[2597]: E0212 22:15:12.255857 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:13.374894 kubelet[2597]: E0212 22:15:13.374823 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:14.256291 kubelet[2597]: E0212 22:15:14.256189 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:16.255354 kubelet[2597]: E0212 22:15:16.255241 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:18.256425 kubelet[2597]: E0212 22:15:18.256308 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:18.376099 kubelet[2597]: E0212 22:15:18.376004 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:20.255428 kubelet[2597]: E0212 22:15:20.255322 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:22.256043 kubelet[2597]: E0212 22:15:22.255978 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:23.377250 kubelet[2597]: E0212 22:15:23.377195 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:24.255580 kubelet[2597]: E0212 22:15:24.255470 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:26.255716 kubelet[2597]: E0212 22:15:26.255657 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:28.256080 kubelet[2597]: E0212 22:15:28.256017 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:28.379086 kubelet[2597]: E0212 22:15:28.379021 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:30.255136 kubelet[2597]: E0212 22:15:30.255107 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:32.256218 kubelet[2597]: E0212 22:15:32.256124 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:33.381151 kubelet[2597]: E0212 22:15:33.381055 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:34.255556 kubelet[2597]: E0212 22:15:34.255454 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:36.255658 kubelet[2597]: E0212 22:15:36.255579 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:38.255804 kubelet[2597]: E0212 22:15:38.255691 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:38.382183 kubelet[2597]: E0212 22:15:38.382116 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:40.255585 kubelet[2597]: E0212 22:15:40.255476 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:42.256376 kubelet[2597]: E0212 22:15:42.256269 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:43.384168 kubelet[2597]: E0212 22:15:43.384094 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:44.253624 systemd[1]: Started sshd@18-147.75.49.97:22-203.196.8.148:42978.service. Feb 12 22:15:44.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.97:22-203.196.8.148:42978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:44.255286 kubelet[2597]: E0212 22:15:44.255268 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:44.280609 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:15:44.280671 kernel: audit: type=1130 audit(1707776144.252:1238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.97:22-203.196.8.148:42978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:45.580141 sshd[3487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.196.8.148 user=root Feb 12 22:15:45.579000 audit[3487]: USER_AUTH pid=3487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:15:45.670984 kernel: audit: type=1100 audit(1707776145.579:1239): pid=3487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:15:46.256270 kubelet[2597]: E0212 22:15:46.256161 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:47.179664 sshd[3487]: Failed password for root from 203.196.8.148 port 42978 ssh2 Feb 12 22:15:47.720393 sshd[3487]: Received disconnect from 203.196.8.148 port 42978:11: Bye Bye [preauth] Feb 12 22:15:47.720393 sshd[3487]: Disconnected from authenticating user root 203.196.8.148 port 42978 [preauth] Feb 12 22:15:47.723069 systemd[1]: sshd@18-147.75.49.97:22-203.196.8.148:42978.service: Deactivated successfully. Feb 12 22:15:47.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.97:22-203.196.8.148:42978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:47.816130 kernel: audit: type=1131 audit(1707776147.722:1240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.97:22-203.196.8.148:42978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:48.256313 kubelet[2597]: E0212 22:15:48.256204 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:48.386251 kubelet[2597]: E0212 22:15:48.386147 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:50.255385 kubelet[2597]: E0212 22:15:50.255278 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:52.255265 kubelet[2597]: E0212 22:15:52.255172 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:53.387555 kubelet[2597]: E0212 22:15:53.387424 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:15:54.255311 kubelet[2597]: E0212 22:15:54.255215 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:56.255568 kubelet[2597]: E0212 22:15:56.255490 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:58.255384 kubelet[2597]: E0212 22:15:58.255327 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:15:58.389625 kubelet[2597]: E0212 22:15:58.389518 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:00.255432 kubelet[2597]: E0212 22:16:00.255380 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:02.255286 kubelet[2597]: E0212 22:16:02.255190 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:03.391392 kubelet[2597]: E0212 22:16:03.391339 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:04.067000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.067000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00085b2c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:16:04.255709 kubelet[2597]: E0212 22:16:04.255670 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:04.283430 kernel: audit: type=1400 audit(1707776164.067:1241): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.283502 kernel: audit: type=1300 audit(1707776164.067:1241): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00085b2c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:16:04.283519 kernel: audit: type=1327 audit(1707776164.067:1241): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:04.067000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:04.378572 kernel: audit: type=1400 audit(1707776164.067:1242): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.067000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.468709 kernel: audit: type=1300 audit(1707776164.067:1242): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0021e7d80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:16:04.067000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0021e7d80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:16:04.590133 kernel: audit: type=1327 audit(1707776164.067:1242): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:04.067000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:04.712000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.712000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c009cca7b0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:16:04.906107 kernel: audit: type=1400 audit(1707776164.712:1243): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.906147 kernel: audit: type=1300 audit(1707776164.712:1243): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c009cca7b0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:16:04.906169 kernel: audit: type=1327 audit(1707776164.712:1243): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:16:04.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:16:04.999631 kernel: audit: type=1400 audit(1707776164.712:1244): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.712000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.712000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002d33ae0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:16:04.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:16:04.712000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.712000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00a825020 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:16:04.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:16:04.712000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.712000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002f992c0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:16:04.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:16:04.714000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.714000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0023ffbf0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:16:04.714000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:16:04.714000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:04.714000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c009cca810 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:16:04.714000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:16:06.256165 kubelet[2597]: E0212 22:16:06.256061 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:07.453000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:07.453000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c48380 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:16:07.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:07.454000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:07.454000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c49400 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:16:07.454000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:07.456000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:07.456000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028b54e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:16:07.456000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:07.462000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:07.462000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018af1a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:16:07.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:08.255429 kubelet[2597]: E0212 22:16:08.255409 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:08.393057 kubelet[2597]: E0212 22:16:08.392990 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:10.255856 kubelet[2597]: E0212 22:16:10.255741 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:12.255612 kubelet[2597]: E0212 22:16:12.255504 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:13.394654 kubelet[2597]: E0212 22:16:13.394587 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:14.255610 kubelet[2597]: E0212 22:16:14.255489 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:16.256114 kubelet[2597]: E0212 22:16:16.256004 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:18.256656 kubelet[2597]: E0212 22:16:18.256579 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:18.396226 kubelet[2597]: E0212 22:16:18.396126 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:20.256123 kubelet[2597]: E0212 22:16:20.256009 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:22.255731 kubelet[2597]: E0212 22:16:22.255646 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:23.397774 kubelet[2597]: E0212 22:16:23.397664 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:24.255695 kubelet[2597]: E0212 22:16:24.255616 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:26.256309 kubelet[2597]: E0212 22:16:26.256200 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:28.255103 kubelet[2597]: E0212 22:16:28.255058 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:28.398689 kubelet[2597]: E0212 22:16:28.398581 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:30.255731 kubelet[2597]: E0212 22:16:30.255611 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:32.255863 kubelet[2597]: E0212 22:16:32.255758 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:33.400154 kubelet[2597]: E0212 22:16:33.400056 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:34.256245 kubelet[2597]: E0212 22:16:34.256140 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:36.256406 kubelet[2597]: E0212 22:16:36.256287 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:38.255741 kubelet[2597]: E0212 22:16:38.255640 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:38.402084 kubelet[2597]: E0212 22:16:38.402021 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:40.255382 kubelet[2597]: E0212 22:16:40.255278 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:42.256233 kubelet[2597]: E0212 22:16:42.256145 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:43.404190 kubelet[2597]: E0212 22:16:43.404087 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:44.256151 kubelet[2597]: E0212 22:16:44.256027 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:46.256705 kubelet[2597]: E0212 22:16:46.256609 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:48.255767 kubelet[2597]: E0212 22:16:48.255709 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:48.406071 kubelet[2597]: E0212 22:16:48.406012 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:50.256329 kubelet[2597]: E0212 22:16:50.256221 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:52.255814 kubelet[2597]: E0212 22:16:52.255704 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:53.407653 kubelet[2597]: E0212 22:16:53.407567 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:16:54.255893 kubelet[2597]: E0212 22:16:54.255775 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:56.255977 kubelet[2597]: E0212 22:16:56.255857 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:58.256704 kubelet[2597]: E0212 22:16:58.256581 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:16:58.409587 kubelet[2597]: E0212 22:16:58.409474 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:00.255451 kubelet[2597]: E0212 22:17:00.255347 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:02.256160 kubelet[2597]: E0212 22:17:02.256059 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:03.410988 kubelet[2597]: E0212 22:17:03.410897 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:04.067000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.103178 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:17:04.103269 kernel: audit: type=1400 audit(1707776224.067:1253): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.067000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00014ff60 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:17:04.255392 kubelet[2597]: E0212 22:17:04.255378 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:04.313001 kernel: audit: type=1300 audit(1707776224.067:1253): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00014ff60 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:17:04.313042 kernel: audit: type=1327 audit(1707776224.067:1253): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:17:04.067000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:17:04.406430 kernel: audit: type=1400 audit(1707776224.067:1254): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.067000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.497667 kernel: audit: type=1300 audit(1707776224.067:1254): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0029923f0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:17:04.067000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0029923f0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:17:04.618208 kernel: audit: type=1327 audit(1707776224.067:1254): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:17:04.067000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:17:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002f5bac0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:17:04.902858 kernel: audit: type=1400 audit(1707776224.713:1255): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.902892 kernel: audit: type=1300 audit(1707776224.713:1255): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002f5bac0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:17:04.902908 kernel: audit: type=1327 audit(1707776224.713:1255): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:17:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:17:04.996184 kernel: audit: type=1400 audit(1707776224.713:1256): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0023feea0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:17:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:17:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c013760fc0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:17:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:17:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002dc2500 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:17:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:17:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0023fefc0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:17:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:17:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0023feff0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:17:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:17:06.255668 kubelet[2597]: E0212 22:17:06.255595 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:07.453000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:07.453000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00014ffe0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:17:07.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:17:07.454000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:07.454000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001074000 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:17:07.454000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:17:07.457000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:07.457000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006faf40 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:17:07.457000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:17:07.462000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:17:07.462000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b9a40 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:17:07.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:17:08.255861 kubelet[2597]: E0212 22:17:08.255814 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:08.412525 kubelet[2597]: E0212 22:17:08.412420 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:10.255548 kubelet[2597]: E0212 22:17:10.255440 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:12.256413 kubelet[2597]: E0212 22:17:12.256297 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:13.414134 kubelet[2597]: E0212 22:17:13.414041 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:14.190893 systemd[1]: Started sshd@19-147.75.49.97:22-203.196.8.148:37066.service. Feb 12 22:17:14.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.97:22-203.196.8.148:37066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:14.218173 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:17:14.218251 kernel: audit: type=1130 audit(1707776234.190:1265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.97:22-203.196.8.148:37066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:14.255805 kubelet[2597]: E0212 22:17:14.255767 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:15.517288 sshd[3502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.196.8.148 user=root Feb 12 22:17:15.516000 audit[3502]: USER_AUTH pid=3502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:17:15.606928 kernel: audit: type=1100 audit(1707776235.516:1266): pid=3502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=203.196.8.148 addr=203.196.8.148 terminal=ssh res=failed' Feb 12 22:17:16.255380 kubelet[2597]: E0212 22:17:16.255274 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:17.472984 sshd[3502]: Failed password for root from 203.196.8.148 port 37066 ssh2 Feb 12 22:17:18.256191 kubelet[2597]: E0212 22:17:18.256076 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:18.416015 kubelet[2597]: E0212 22:17:18.415917 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:19.558434 sshd[3502]: Received disconnect from 203.196.8.148 port 37066:11: Bye Bye [preauth] Feb 12 22:17:19.558434 sshd[3502]: Disconnected from authenticating user root 203.196.8.148 port 37066 [preauth] Feb 12 22:17:19.560947 systemd[1]: sshd@19-147.75.49.97:22-203.196.8.148:37066.service: Deactivated successfully. Feb 12 22:17:19.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.97:22-203.196.8.148:37066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:19.652124 kernel: audit: type=1131 audit(1707776239.560:1267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.97:22-203.196.8.148:37066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:20.255305 kubelet[2597]: E0212 22:17:20.255209 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:22.256364 kubelet[2597]: E0212 22:17:22.256258 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:23.417175 kubelet[2597]: E0212 22:17:23.417108 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:24.255641 kubelet[2597]: E0212 22:17:24.255528 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:26.256126 kubelet[2597]: E0212 22:17:26.256014 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:28.255796 kubelet[2597]: E0212 22:17:28.255745 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:28.418608 kubelet[2597]: E0212 22:17:28.418505 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:30.255229 kubelet[2597]: E0212 22:17:30.255156 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:32.255972 kubelet[2597]: E0212 22:17:32.255846 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:33.420651 kubelet[2597]: E0212 22:17:33.420530 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:34.255246 kubelet[2597]: E0212 22:17:34.255180 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:36.255637 kubelet[2597]: E0212 22:17:36.255561 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:38.255860 kubelet[2597]: E0212 22:17:38.255756 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:38.422470 kubelet[2597]: E0212 22:17:38.422371 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:40.256267 kubelet[2597]: E0212 22:17:40.256189 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:42.256108 kubelet[2597]: E0212 22:17:42.256013 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:43.424374 kubelet[2597]: E0212 22:17:43.424283 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:44.255342 kubelet[2597]: E0212 22:17:44.255267 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:46.256177 kubelet[2597]: E0212 22:17:46.256066 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:48.256554 kubelet[2597]: E0212 22:17:48.256484 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:48.425959 kubelet[2597]: E0212 22:17:48.425846 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:50.255500 kubelet[2597]: E0212 22:17:50.255377 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:52.256490 kubelet[2597]: E0212 22:17:52.256383 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:53.427766 kubelet[2597]: E0212 22:17:53.427711 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:17:54.255420 kubelet[2597]: E0212 22:17:54.255314 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:56.255780 kubelet[2597]: E0212 22:17:56.255669 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:58.256379 kubelet[2597]: E0212 22:17:58.256261 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:17:58.429345 kubelet[2597]: E0212 22:17:58.429277 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:00.255974 kubelet[2597]: E0212 22:18:00.255867 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:02.256416 kubelet[2597]: E0212 22:18:02.256305 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:03.431168 kubelet[2597]: E0212 22:18:03.431064 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:04.067000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.067000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002dab620 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:18:04.255398 kubelet[2597]: E0212 22:18:04.255373 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:04.281469 kernel: audit: type=1400 audit(1707776284.067:1268): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.281518 kernel: audit: type=1300 audit(1707776284.067:1268): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002dab620 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:18:04.067000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:18:04.375025 kernel: audit: type=1327 audit(1707776284.067:1268): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:18:04.068000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.466451 kernel: audit: type=1400 audit(1707776284.068:1269): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.466552 kernel: audit: type=1300 audit(1707776284.068:1269): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00106d560 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:18:04.068000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00106d560 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:18:04.068000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:18:04.680728 kernel: audit: type=1327 audit(1707776284.068:1269): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:18:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c001dc24a0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:18:04.904848 kernel: audit: type=1400 audit(1707776284.713:1270): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.904888 kernel: audit: type=1300 audit(1707776284.713:1270): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c001dc24a0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:18:04.905025 kernel: audit: type=1327 audit(1707776284.713:1270): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:18:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:18:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:05.092481 kernel: audit: type=1400 audit(1707776284.713:1271): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00b693e00 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:18:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:18:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002f5b500 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:18:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:18:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c013168360 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:18:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:18:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c004da5530 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:18:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:18:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00442ced0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:18:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:18:06.255901 kubelet[2597]: E0212 22:18:06.255804 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:07.453000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:07.453000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002dab640 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:18:07.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:18:07.455000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:07.455000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002dab660 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:18:07.455000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:18:07.458000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:07.458000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0005eb280 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:18:07.458000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:18:07.463000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:18:07.463000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0008094a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:18:07.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:18:08.256067 kubelet[2597]: E0212 22:18:08.256005 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:08.433279 kubelet[2597]: E0212 22:18:08.433178 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:10.255353 kubelet[2597]: E0212 22:18:10.255287 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:12.256287 kubelet[2597]: E0212 22:18:12.256198 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:13.435184 kubelet[2597]: E0212 22:18:13.435078 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:14.255751 kubelet[2597]: E0212 22:18:14.255691 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:16.256151 kubelet[2597]: E0212 22:18:16.256027 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:18.256438 kubelet[2597]: E0212 22:18:18.256329 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:18.436239 kubelet[2597]: E0212 22:18:18.436145 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:20.256444 kubelet[2597]: E0212 22:18:20.256335 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:22.256266 kubelet[2597]: E0212 22:18:22.256160 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:23.437350 kubelet[2597]: E0212 22:18:23.437248 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:24.255917 kubelet[2597]: E0212 22:18:24.255801 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:26.255194 kubelet[2597]: E0212 22:18:26.255139 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:28.255237 kubelet[2597]: E0212 22:18:28.255205 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:28.438695 kubelet[2597]: E0212 22:18:28.438588 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:30.255512 kubelet[2597]: E0212 22:18:30.255463 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:32.255320 kubelet[2597]: E0212 22:18:32.255263 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:33.439522 kubelet[2597]: E0212 22:18:33.439482 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:34.255344 kubelet[2597]: E0212 22:18:34.255230 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:36.256497 kubelet[2597]: E0212 22:18:36.256382 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:38.256627 kubelet[2597]: E0212 22:18:38.256523 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:38.441094 kubelet[2597]: E0212 22:18:38.440990 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:40.255415 kubelet[2597]: E0212 22:18:40.255310 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:42.255382 kubelet[2597]: E0212 22:18:42.255305 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:43.442704 kubelet[2597]: E0212 22:18:43.442608 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:44.255900 kubelet[2597]: E0212 22:18:44.255791 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:46.256265 kubelet[2597]: E0212 22:18:46.256192 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:48.256453 kubelet[2597]: E0212 22:18:48.256354 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:48.444452 kubelet[2597]: E0212 22:18:48.444383 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:49.847706 env[1477]: time="2024-02-12T22:18:49.847675239Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:18:49.848213 env[1477]: time="2024-02-12T22:18:49.848203197Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:18:49.850556 env[1477]: time="2024-02-12T22:18:49.850511203Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:18:49.851396 env[1477]: time="2024-02-12T22:18:49.851344877Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:18:49.851844 env[1477]: time="2024-02-12T22:18:49.851797168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 22:18:49.852424 env[1477]: time="2024-02-12T22:18:49.852366821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 22:18:49.856208 env[1477]: time="2024-02-12T22:18:49.856160666Z" level=info msg="CreateContainer within sandbox \"8c9214b2a6e083e6d9b602d4338d724e3f46a7a6892a2746028f5f2708680a6f\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 22:18:49.860768 env[1477]: time="2024-02-12T22:18:49.860715927Z" level=info msg="CreateContainer within sandbox \"8c9214b2a6e083e6d9b602d4338d724e3f46a7a6892a2746028f5f2708680a6f\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"1423f03c8aa8a96232dc5b4516b2e5ad666f203e38a69a8b4702b8d27f6f0284\"" Feb 12 22:18:49.861089 env[1477]: time="2024-02-12T22:18:49.861053573Z" level=info msg="StartContainer for \"1423f03c8aa8a96232dc5b4516b2e5ad666f203e38a69a8b4702b8d27f6f0284\"" Feb 12 22:18:49.869456 systemd[1]: Started cri-containerd-1423f03c8aa8a96232dc5b4516b2e5ad666f203e38a69a8b4702b8d27f6f0284.scope. Feb 12 22:18:49.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.903151 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:18:49.903226 kernel: audit: type=1400 audit(1707776329.875:1280): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.029360 kernel: audit: type=1400 audit(1707776329.875:1281): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.029409 kernel: audit: type=1400 audit(1707776329.875:1282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.157049 kernel: audit: type=1400 audit(1707776329.875:1283): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.157116 kernel: audit: type=1400 audit(1707776329.875:1284): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.255540 kubelet[2597]: E0212 22:18:50.255521 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:50.285270 kernel: audit: type=1400 audit(1707776329.875:1285): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.285324 kernel: audit: type=1400 audit(1707776329.875:1286): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.413542 kernel: audit: type=1400 audit(1707776329.875:1287): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.413601 kernel: audit: type=1400 audit(1707776329.875:1288): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.541125 kernel: audit: type=1400 audit(1707776329.965:1289): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit: BPF prog-id=138 op=LOAD Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3235 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:18:49.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323366303363386161386139363233326463356234353136623265 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3235 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:18:49.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323366303363386161386139363233326463356234353136623265 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:49.965000 audit: BPF prog-id=139 op=LOAD Feb 12 22:18:49.965000 audit[3528]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000301950 items=0 ppid=3235 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:18:49.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323366303363386161386139363233326463356234353136623265 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000147770 a2=78 a3=c000301998 items=0 ppid=3235 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:18:50.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323366303363386161386139363233326463356234353136623265 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.092000 audit: BPF prog-id=140 op=LOAD Feb 12 22:18:50.092000 audit[3528]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=1 items=0 ppid=3235 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:18:50.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323366303363386161386139363233326463356234353136623265 Feb 12 22:18:50.220000 audit: BPF prog-id=140 op=UNLOAD Feb 12 22:18:50.220000 audit: BPF prog-id=139 op=UNLOAD Feb 12 22:18:50.220000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.220000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.220000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.220000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.220000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.220000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.220000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.220000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.220000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.220000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:18:50.220000 audit: BPF prog-id=141 op=LOAD Feb 12 22:18:50.220000 audit[3528]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000301da8 items=0 ppid=3235 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:18:50.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323366303363386161386139363233326463356234353136623265 Feb 12 22:18:50.557405 env[1477]: time="2024-02-12T22:18:50.557377248Z" level=info msg="StartContainer for \"1423f03c8aa8a96232dc5b4516b2e5ad666f203e38a69a8b4702b8d27f6f0284\" returns successfully" Feb 12 22:18:50.734379 kubelet[2597]: I0212 22:18:50.734201 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-fd657d7b4-bhlwt" podStartSLOduration=-9.223371471120686e+09 pod.CreationTimestamp="2024-02-12 22:09:25 +0000 UTC" firstStartedPulling="2024-02-12 22:09:27.174601502 +0000 UTC m=+19.030627157" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:18:50.733136456 +0000 UTC m=+582.589162171" watchObservedRunningTime="2024-02-12 22:18:50.734089883 +0000 UTC m=+582.590115581" Feb 12 22:18:50.762000 audit[3596]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:18:50.762000 audit[3596]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffcf5073ac0 a2=0 a3=7ffcf5073aac items=0 ppid=2903 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:18:50.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:18:50.762000 audit[3596]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:18:50.762000 audit[3596]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffcf5073ac0 a2=0 a3=7ffcf5073aac items=0 ppid=2903 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:18:50.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:18:52.256022 kubelet[2597]: E0212 22:18:52.255906 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:53.323897 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount452962711.mount: Deactivated successfully. Feb 12 22:18:53.446591 kubelet[2597]: E0212 22:18:53.446479 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:18:54.255710 kubelet[2597]: E0212 22:18:54.255637 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:56.255766 kubelet[2597]: E0212 22:18:56.255696 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:58.256490 kubelet[2597]: E0212 22:18:58.256374 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:18:58.448803 kubelet[2597]: E0212 22:18:58.448732 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:19:00.256156 kubelet[2597]: E0212 22:19:00.255970 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:19:02.255878 kubelet[2597]: E0212 22:19:02.255776 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:19:03.450136 kubelet[2597]: E0212 22:19:03.450026 2597 kubelet.go:2475] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 12 22:19:04.068000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.113822 kernel: kauditd_printk_skb: 63 callbacks suppressed Feb 12 22:19:04.113895 kernel: audit: type=1400 audit(1707776344.068:1301): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.068000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089aec0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:19:04.255233 kubelet[2597]: E0212 22:19:04.255214 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:19:04.325593 kernel: audit: type=1300 audit(1707776344.068:1301): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089aec0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:19:04.325641 kernel: audit: type=1327 audit(1707776344.068:1301): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:19:04.068000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:19:04.070000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.513083 kernel: audit: type=1400 audit(1707776344.070:1302): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.513287 kernel: audit: type=1300 audit(1707776344.070:1302): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018f7d10 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:19:04.070000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018f7d10 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:19:04.070000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:19:04.726889 kernel: audit: type=1327 audit(1707776344.070:1302): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:19:04.727020 kernel: audit: type=1400 audit(1707776344.713:1303): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002f98520 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:19:04.915722 kernel: audit: type=1300 audit(1707776344.713:1303): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002f98520 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:19:04.915763 kernel: audit: type=1327 audit(1707776344.713:1303): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:19:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:19:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:05.101496 kernel: audit: type=1400 audit(1707776344.713:1304): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002bc1860 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:19:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:19:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00b52b170 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:19:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:19:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00385f600 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:19:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:19:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002bc19b0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:19:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:19:04.713000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:04.713000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00ca35650 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:19:04.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:19:06.181332 env[1477]: time="2024-02-12T22:19:06.181302784Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:19:06.181846 env[1477]: time="2024-02-12T22:19:06.181833763Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:19:06.182770 env[1477]: time="2024-02-12T22:19:06.182759491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:19:06.183723 env[1477]: time="2024-02-12T22:19:06.183711435Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:19:06.184191 env[1477]: time="2024-02-12T22:19:06.184177221Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 22:19:06.197260 env[1477]: time="2024-02-12T22:19:06.197166891Z" level=info msg="CreateContainer within sandbox \"88a2460b1222a8dd557ce41586b28cba3f2f7a8ff33bb7c7dbf62dffc7bb50d7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 22:19:06.210213 env[1477]: time="2024-02-12T22:19:06.210117389Z" level=info msg="CreateContainer within sandbox \"88a2460b1222a8dd557ce41586b28cba3f2f7a8ff33bb7c7dbf62dffc7bb50d7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b47079a2aebc0f7823549e1ddb447fb928926ac47bfedaf327baff24991fe028\"" Feb 12 22:19:06.210874 env[1477]: time="2024-02-12T22:19:06.210810601Z" level=info msg="StartContainer for \"b47079a2aebc0f7823549e1ddb447fb928926ac47bfedaf327baff24991fe028\"" Feb 12 22:19:06.220873 systemd[1]: Started cri-containerd-b47079a2aebc0f7823549e1ddb447fb928926ac47bfedaf327baff24991fe028.scope. Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7595e9f008 items=0 ppid=3257 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:06.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373037396132616562633066373832333534396531646462343437 Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.226000 audit: BPF prog-id=142 op=LOAD Feb 12 22:19:06.226000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003bc228 items=0 ppid=3257 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:06.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373037396132616562633066373832333534396531646462343437 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit: BPF prog-id=143 op=LOAD Feb 12 22:19:06.227000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003bc278 items=0 ppid=3257 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:06.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373037396132616562633066373832333534396531646462343437 Feb 12 22:19:06.227000 audit: BPF prog-id=143 op=UNLOAD Feb 12 22:19:06.227000 audit: BPF prog-id=142 op=UNLOAD Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:06.227000 audit: BPF prog-id=144 op=LOAD Feb 12 22:19:06.227000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003bc308 items=0 ppid=3257 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:06.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373037396132616562633066373832333534396531646462343437 Feb 12 22:19:06.248386 env[1477]: time="2024-02-12T22:19:06.248358067Z" level=info msg="StartContainer for \"b47079a2aebc0f7823549e1ddb447fb928926ac47bfedaf327baff24991fe028\" returns successfully" Feb 12 22:19:06.255859 kubelet[2597]: E0212 22:19:06.255780 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:19:06.958677 env[1477]: time="2024-02-12T22:19:06.958637868Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:19:06.960386 systemd[1]: cri-containerd-b47079a2aebc0f7823549e1ddb447fb928926ac47bfedaf327baff24991fe028.scope: Deactivated successfully. Feb 12 22:19:06.971008 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b47079a2aebc0f7823549e1ddb447fb928926ac47bfedaf327baff24991fe028-rootfs.mount: Deactivated successfully. Feb 12 22:19:06.979000 audit: BPF prog-id=144 op=UNLOAD Feb 12 22:19:07.455000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:07.455000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089be60 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:19:07.455000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:19:07.456000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:07.456000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089be80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:19:07.456000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:19:07.458000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:07.458000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00111c780 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:19:07.458000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:19:07.465000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:19:07.465000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089bfe0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:19:07.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:19:07.589489 env[1477]: time="2024-02-12T22:19:07.589354940Z" level=info msg="shim disconnected" id=b47079a2aebc0f7823549e1ddb447fb928926ac47bfedaf327baff24991fe028 Feb 12 22:19:07.589489 env[1477]: time="2024-02-12T22:19:07.589456044Z" level=warning msg="cleaning up after shim disconnected" id=b47079a2aebc0f7823549e1ddb447fb928926ac47bfedaf327baff24991fe028 namespace=k8s.io Feb 12 22:19:07.589489 env[1477]: time="2024-02-12T22:19:07.589486287Z" level=info msg="cleaning up dead shim" Feb 12 22:19:07.597850 env[1477]: time="2024-02-12T22:19:07.597832525Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:19:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3674 runtime=io.containerd.runc.v2\n" Feb 12 22:19:07.763833 env[1477]: time="2024-02-12T22:19:07.763752196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 22:19:08.256047 kubelet[2597]: E0212 22:19:08.255991 2597 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:19:10.269960 systemd[1]: Created slice kubepods-besteffort-podd69383b0_7b9e_4b37_94b0_ee606e362b74.slice. Feb 12 22:19:10.274875 env[1477]: time="2024-02-12T22:19:10.274791893Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-242vw,Uid:d69383b0-7b9e-4b37-94b0-ee606e362b74,Namespace:calico-system,Attempt:0,}" Feb 12 22:19:10.314500 env[1477]: time="2024-02-12T22:19:10.314458016Z" level=error msg="Failed to destroy network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:10.314696 env[1477]: time="2024-02-12T22:19:10.314679098Z" level=error msg="encountered an error cleaning up failed sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:10.314744 env[1477]: time="2024-02-12T22:19:10.314713422Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-242vw,Uid:d69383b0-7b9e-4b37-94b0-ee606e362b74,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:10.314914 kubelet[2597]: E0212 22:19:10.314902 2597 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:10.315064 kubelet[2597]: E0212 22:19:10.314948 2597 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-242vw" Feb 12 22:19:10.315064 kubelet[2597]: E0212 22:19:10.314963 2597 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-242vw" Feb 12 22:19:10.315064 kubelet[2597]: E0212 22:19:10.314996 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-242vw_calico-system(d69383b0-7b9e-4b37-94b0-ee606e362b74)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-242vw_calico-system(d69383b0-7b9e-4b37-94b0-ee606e362b74)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:19:10.315685 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1-shm.mount: Deactivated successfully. Feb 12 22:19:10.772085 kubelet[2597]: I0212 22:19:10.771988 2597 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:19:10.773357 env[1477]: time="2024-02-12T22:19:10.773248748Z" level=info msg="StopPodSandbox for \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\"" Feb 12 22:19:10.825852 env[1477]: time="2024-02-12T22:19:10.825786196Z" level=error msg="StopPodSandbox for \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\" failed" error="failed to destroy network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:10.826095 kubelet[2597]: E0212 22:19:10.826069 2597 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:19:10.826222 kubelet[2597]: E0212 22:19:10.826150 2597 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1} Feb 12 22:19:10.826317 kubelet[2597]: E0212 22:19:10.826230 2597 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d69383b0-7b9e-4b37-94b0-ee606e362b74\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:19:10.826317 kubelet[2597]: E0212 22:19:10.826294 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d69383b0-7b9e-4b37-94b0-ee606e362b74\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:19:11.213080 kubelet[2597]: I0212 22:19:11.212868 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:19:11.213900 kubelet[2597]: I0212 22:19:11.213841 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:19:11.214826 kubelet[2597]: I0212 22:19:11.214767 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:19:11.219016 systemd[1]: Created slice kubepods-besteffort-pod8af8906d_f36b_4a21_828c_b5c53165f945.slice. Feb 12 22:19:11.220945 systemd[1]: Created slice kubepods-burstable-pod50c42a46_815d_42a9_933b_f2f227f8c5a7.slice. Feb 12 22:19:11.223364 systemd[1]: Created slice kubepods-burstable-pod626b6a1d_cf78_40dc_b919_7e003fb6b49d.slice. Feb 12 22:19:11.333447 kubelet[2597]: I0212 22:19:11.333327 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/50c42a46-815d-42a9-933b-f2f227f8c5a7-config-volume\") pod \"coredns-787d4945fb-kh6pd\" (UID: \"50c42a46-815d-42a9-933b-f2f227f8c5a7\") " pod="kube-system/coredns-787d4945fb-kh6pd" Feb 12 22:19:11.333447 kubelet[2597]: I0212 22:19:11.333438 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k26hg\" (UniqueName: \"kubernetes.io/projected/50c42a46-815d-42a9-933b-f2f227f8c5a7-kube-api-access-k26hg\") pod \"coredns-787d4945fb-kh6pd\" (UID: \"50c42a46-815d-42a9-933b-f2f227f8c5a7\") " pod="kube-system/coredns-787d4945fb-kh6pd" Feb 12 22:19:11.334423 kubelet[2597]: I0212 22:19:11.333635 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/626b6a1d-cf78-40dc-b919-7e003fb6b49d-config-volume\") pod \"coredns-787d4945fb-mxz9p\" (UID: \"626b6a1d-cf78-40dc-b919-7e003fb6b49d\") " pod="kube-system/coredns-787d4945fb-mxz9p" Feb 12 22:19:11.334423 kubelet[2597]: I0212 22:19:11.333802 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8af8906d-f36b-4a21-828c-b5c53165f945-tigera-ca-bundle\") pod \"calico-kube-controllers-5588694d89-69h2v\" (UID: \"8af8906d-f36b-4a21-828c-b5c53165f945\") " pod="calico-system/calico-kube-controllers-5588694d89-69h2v" Feb 12 22:19:11.334423 kubelet[2597]: I0212 22:19:11.334032 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b8dvl\" (UniqueName: \"kubernetes.io/projected/626b6a1d-cf78-40dc-b919-7e003fb6b49d-kube-api-access-b8dvl\") pod \"coredns-787d4945fb-mxz9p\" (UID: \"626b6a1d-cf78-40dc-b919-7e003fb6b49d\") " pod="kube-system/coredns-787d4945fb-mxz9p" Feb 12 22:19:11.334423 kubelet[2597]: I0212 22:19:11.334125 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pnrr7\" (UniqueName: \"kubernetes.io/projected/8af8906d-f36b-4a21-828c-b5c53165f945-kube-api-access-pnrr7\") pod \"calico-kube-controllers-5588694d89-69h2v\" (UID: \"8af8906d-f36b-4a21-828c-b5c53165f945\") " pod="calico-system/calico-kube-controllers-5588694d89-69h2v" Feb 12 22:19:11.521077 env[1477]: time="2024-02-12T22:19:11.521002254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5588694d89-69h2v,Uid:8af8906d-f36b-4a21-828c-b5c53165f945,Namespace:calico-system,Attempt:0,}" Feb 12 22:19:11.523788 env[1477]: time="2024-02-12T22:19:11.523746341Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-kh6pd,Uid:50c42a46-815d-42a9-933b-f2f227f8c5a7,Namespace:kube-system,Attempt:0,}" Feb 12 22:19:11.525069 env[1477]: time="2024-02-12T22:19:11.525021700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mxz9p,Uid:626b6a1d-cf78-40dc-b919-7e003fb6b49d,Namespace:kube-system,Attempt:0,}" Feb 12 22:19:11.592895 env[1477]: time="2024-02-12T22:19:11.592851349Z" level=error msg="Failed to destroy network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.593155 env[1477]: time="2024-02-12T22:19:11.593109674Z" level=error msg="encountered an error cleaning up failed sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.593211 env[1477]: time="2024-02-12T22:19:11.593151201Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-kh6pd,Uid:50c42a46-815d-42a9-933b-f2f227f8c5a7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.593381 kubelet[2597]: E0212 22:19:11.593339 2597 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.593381 kubelet[2597]: E0212 22:19:11.593383 2597 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-kh6pd" Feb 12 22:19:11.593496 kubelet[2597]: E0212 22:19:11.593402 2597 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-kh6pd" Feb 12 22:19:11.593496 kubelet[2597]: E0212 22:19:11.593443 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-kh6pd_kube-system(50c42a46-815d-42a9-933b-f2f227f8c5a7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-kh6pd_kube-system(50c42a46-815d-42a9-933b-f2f227f8c5a7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-kh6pd" podUID=50c42a46-815d-42a9-933b-f2f227f8c5a7 Feb 12 22:19:11.593633 env[1477]: time="2024-02-12T22:19:11.593501365Z" level=error msg="Failed to destroy network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.593774 env[1477]: time="2024-02-12T22:19:11.593753187Z" level=error msg="encountered an error cleaning up failed sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.593835 env[1477]: time="2024-02-12T22:19:11.593787468Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5588694d89-69h2v,Uid:8af8906d-f36b-4a21-828c-b5c53165f945,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.593904 kubelet[2597]: E0212 22:19:11.593895 2597 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.593953 kubelet[2597]: E0212 22:19:11.593917 2597 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5588694d89-69h2v" Feb 12 22:19:11.593953 kubelet[2597]: E0212 22:19:11.593949 2597 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5588694d89-69h2v" Feb 12 22:19:11.594061 kubelet[2597]: E0212 22:19:11.594025 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5588694d89-69h2v_calico-system(8af8906d-f36b-4a21-828c-b5c53165f945)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5588694d89-69h2v_calico-system(8af8906d-f36b-4a21-828c-b5c53165f945)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5588694d89-69h2v" podUID=8af8906d-f36b-4a21-828c-b5c53165f945 Feb 12 22:19:11.597478 env[1477]: time="2024-02-12T22:19:11.597423624Z" level=error msg="Failed to destroy network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.597642 env[1477]: time="2024-02-12T22:19:11.597596937Z" level=error msg="encountered an error cleaning up failed sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.597678 env[1477]: time="2024-02-12T22:19:11.597629952Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mxz9p,Uid:626b6a1d-cf78-40dc-b919-7e003fb6b49d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.597748 kubelet[2597]: E0212 22:19:11.597739 2597 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.597781 kubelet[2597]: E0212 22:19:11.597764 2597 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-mxz9p" Feb 12 22:19:11.597806 kubelet[2597]: E0212 22:19:11.597781 2597 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-mxz9p" Feb 12 22:19:11.597831 kubelet[2597]: E0212 22:19:11.597808 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-mxz9p_kube-system(626b6a1d-cf78-40dc-b919-7e003fb6b49d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-mxz9p_kube-system(626b6a1d-cf78-40dc-b919-7e003fb6b49d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-mxz9p" podUID=626b6a1d-cf78-40dc-b919-7e003fb6b49d Feb 12 22:19:11.777322 kubelet[2597]: I0212 22:19:11.777114 2597 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:19:11.778271 env[1477]: time="2024-02-12T22:19:11.778183515Z" level=info msg="StopPodSandbox for \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\"" Feb 12 22:19:11.779495 kubelet[2597]: I0212 22:19:11.779379 2597 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:19:11.780527 env[1477]: time="2024-02-12T22:19:11.780427258Z" level=info msg="StopPodSandbox for \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\"" Feb 12 22:19:11.781489 kubelet[2597]: I0212 22:19:11.781436 2597 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:19:11.782484 env[1477]: time="2024-02-12T22:19:11.782417995Z" level=info msg="StopPodSandbox for \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\"" Feb 12 22:19:11.827362 env[1477]: time="2024-02-12T22:19:11.827294389Z" level=error msg="StopPodSandbox for \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\" failed" error="failed to destroy network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.827613 kubelet[2597]: E0212 22:19:11.827568 2597 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:19:11.827679 kubelet[2597]: E0212 22:19:11.827619 2597 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467} Feb 12 22:19:11.827723 kubelet[2597]: E0212 22:19:11.827683 2597 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"50c42a46-815d-42a9-933b-f2f227f8c5a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:19:11.827797 kubelet[2597]: E0212 22:19:11.827733 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"50c42a46-815d-42a9-933b-f2f227f8c5a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-kh6pd" podUID=50c42a46-815d-42a9-933b-f2f227f8c5a7 Feb 12 22:19:11.832752 env[1477]: time="2024-02-12T22:19:11.832692841Z" level=error msg="StopPodSandbox for \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\" failed" error="failed to destroy network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.832890 kubelet[2597]: E0212 22:19:11.832877 2597 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:19:11.832948 kubelet[2597]: E0212 22:19:11.832903 2597 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd} Feb 12 22:19:11.832948 kubelet[2597]: E0212 22:19:11.832940 2597 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8af8906d-f36b-4a21-828c-b5c53165f945\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:19:11.833049 kubelet[2597]: E0212 22:19:11.832966 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8af8906d-f36b-4a21-828c-b5c53165f945\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5588694d89-69h2v" podUID=8af8906d-f36b-4a21-828c-b5c53165f945 Feb 12 22:19:11.833270 env[1477]: time="2024-02-12T22:19:11.833215315Z" level=error msg="StopPodSandbox for \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\" failed" error="failed to destroy network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:11.833396 kubelet[2597]: E0212 22:19:11.833356 2597 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:19:11.833396 kubelet[2597]: E0212 22:19:11.833377 2597 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a} Feb 12 22:19:11.833485 kubelet[2597]: E0212 22:19:11.833405 2597 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"626b6a1d-cf78-40dc-b919-7e003fb6b49d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:19:11.833485 kubelet[2597]: E0212 22:19:11.833428 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"626b6a1d-cf78-40dc-b919-7e003fb6b49d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-mxz9p" podUID=626b6a1d-cf78-40dc-b919-7e003fb6b49d Feb 12 22:19:12.461553 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a-shm.mount: Deactivated successfully. Feb 12 22:19:12.461611 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467-shm.mount: Deactivated successfully. Feb 12 22:19:12.461645 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd-shm.mount: Deactivated successfully. Feb 12 22:19:22.255823 env[1477]: time="2024-02-12T22:19:22.255730689Z" level=info msg="StopPodSandbox for \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\"" Feb 12 22:19:22.269045 env[1477]: time="2024-02-12T22:19:22.268979355Z" level=error msg="StopPodSandbox for \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\" failed" error="failed to destroy network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:22.269198 kubelet[2597]: E0212 22:19:22.269154 2597 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:19:22.269198 kubelet[2597]: E0212 22:19:22.269182 2597 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a} Feb 12 22:19:22.269401 kubelet[2597]: E0212 22:19:22.269206 2597 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"626b6a1d-cf78-40dc-b919-7e003fb6b49d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:19:22.269401 kubelet[2597]: E0212 22:19:22.269225 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"626b6a1d-cf78-40dc-b919-7e003fb6b49d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-mxz9p" podUID=626b6a1d-cf78-40dc-b919-7e003fb6b49d Feb 12 22:19:24.255476 env[1477]: time="2024-02-12T22:19:24.255422984Z" level=info msg="StopPodSandbox for \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\"" Feb 12 22:19:24.268733 env[1477]: time="2024-02-12T22:19:24.268695859Z" level=error msg="StopPodSandbox for \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\" failed" error="failed to destroy network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:24.268902 kubelet[2597]: E0212 22:19:24.268891 2597 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:19:24.269133 kubelet[2597]: E0212 22:19:24.268918 2597 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1} Feb 12 22:19:24.269133 kubelet[2597]: E0212 22:19:24.268959 2597 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d69383b0-7b9e-4b37-94b0-ee606e362b74\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:19:24.269133 kubelet[2597]: E0212 22:19:24.268976 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d69383b0-7b9e-4b37-94b0-ee606e362b74\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-242vw" podUID=d69383b0-7b9e-4b37-94b0-ee606e362b74 Feb 12 22:19:25.035796 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount556152446.mount: Deactivated successfully. Feb 12 22:19:25.058296 env[1477]: time="2024-02-12T22:19:25.058249885Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:19:25.058795 env[1477]: time="2024-02-12T22:19:25.058753518Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:19:25.059445 env[1477]: time="2024-02-12T22:19:25.059405973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:19:25.060384 env[1477]: time="2024-02-12T22:19:25.060338140Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:19:25.060541 env[1477]: time="2024-02-12T22:19:25.060498504Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 22:19:25.064561 env[1477]: time="2024-02-12T22:19:25.064539293Z" level=info msg="CreateContainer within sandbox \"88a2460b1222a8dd557ce41586b28cba3f2f7a8ff33bb7c7dbf62dffc7bb50d7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 22:19:25.069644 env[1477]: time="2024-02-12T22:19:25.069598647Z" level=info msg="CreateContainer within sandbox \"88a2460b1222a8dd557ce41586b28cba3f2f7a8ff33bb7c7dbf62dffc7bb50d7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5a65a310cfbc9bb37b7e3a8a20cfdf3cf91a88bcf3945e1a7ed043539d6adac3\"" Feb 12 22:19:25.069838 env[1477]: time="2024-02-12T22:19:25.069828553Z" level=info msg="StartContainer for \"5a65a310cfbc9bb37b7e3a8a20cfdf3cf91a88bcf3945e1a7ed043539d6adac3\"" Feb 12 22:19:25.078525 systemd[1]: Started cri-containerd-5a65a310cfbc9bb37b7e3a8a20cfdf3cf91a88bcf3945e1a7ed043539d6adac3.scope. Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.113917 kernel: kauditd_printk_skb: 70 callbacks suppressed Feb 12 22:19:25.113968 kernel: audit: type=1400 audit(1707776365.086:1320): avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f35ab393228 items=0 ppid=3257 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:25.255114 env[1477]: time="2024-02-12T22:19:25.255096184Z" level=info msg="StopPodSandbox for \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\"" Feb 12 22:19:25.255114 env[1477]: time="2024-02-12T22:19:25.255096152Z" level=info msg="StopPodSandbox for \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\"" Feb 12 22:19:25.266796 env[1477]: time="2024-02-12T22:19:25.266756383Z" level=error msg="StopPodSandbox for \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\" failed" error="failed to destroy network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:25.267038 env[1477]: time="2024-02-12T22:19:25.266925863Z" level=error msg="StopPodSandbox for \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\" failed" error="failed to destroy network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:19:25.267067 kubelet[2597]: E0212 22:19:25.266897 2597 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:19:25.267067 kubelet[2597]: E0212 22:19:25.266933 2597 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd} Feb 12 22:19:25.267067 kubelet[2597]: E0212 22:19:25.266955 2597 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8af8906d-f36b-4a21-828c-b5c53165f945\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:19:25.267067 kubelet[2597]: E0212 22:19:25.266975 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8af8906d-f36b-4a21-828c-b5c53165f945\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5588694d89-69h2v" podUID=8af8906d-f36b-4a21-828c-b5c53165f945 Feb 12 22:19:25.267193 kubelet[2597]: E0212 22:19:25.267004 2597 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:19:25.267193 kubelet[2597]: E0212 22:19:25.267018 2597 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467} Feb 12 22:19:25.267193 kubelet[2597]: E0212 22:19:25.267037 2597 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"50c42a46-815d-42a9-933b-f2f227f8c5a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:19:25.267193 kubelet[2597]: E0212 22:19:25.267051 2597 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"50c42a46-815d-42a9-933b-f2f227f8c5a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-kh6pd" podUID=50c42a46-815d-42a9-933b-f2f227f8c5a7 Feb 12 22:19:25.274667 kernel: audit: type=1300 audit(1707776365.086:1320): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f35ab393228 items=0 ppid=3257 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:25.274706 kernel: audit: type=1327 audit(1707776365.086:1320): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363561333130636662633962623337623765336138613230636664 Feb 12 22:19:25.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363561333130636662633962623337623765336138613230636664 Feb 12 22:19:25.367961 kernel: audit: type=1400 audit(1707776365.086:1321): avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.431206 kernel: audit: type=1400 audit(1707776365.086:1321): avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.557895 kernel: audit: type=1400 audit(1707776365.086:1321): avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.557929 kernel: audit: type=1400 audit(1707776365.086:1321): avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.621847 kernel: audit: type=1400 audit(1707776365.086:1321): avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.627728 env[1477]: time="2024-02-12T22:19:25.627677748Z" level=info msg="StartContainer for \"5a65a310cfbc9bb37b7e3a8a20cfdf3cf91a88bcf3945e1a7ed043539d6adac3\" returns successfully" Feb 12 22:19:25.685838 kernel: audit: type=1400 audit(1707776365.086:1321): avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.749829 kernel: audit: type=1400 audit(1707776365.086:1321): avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.086000 audit: BPF prog-id=145 op=LOAD Feb 12 22:19:25.086000 audit[4093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002c5c88 items=0 ppid=3257 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:25.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363561333130636662633962623337623765336138613230636664 Feb 12 22:19:25.273000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.273000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.273000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.273000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.273000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.273000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.273000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.273000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.273000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.273000 audit: BPF prog-id=146 op=LOAD Feb 12 22:19:25.273000 audit[4093]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002c5cd8 items=0 ppid=3257 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:25.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363561333130636662633962623337623765336138613230636664 Feb 12 22:19:25.430000 audit: BPF prog-id=146 op=UNLOAD Feb 12 22:19:25.430000 audit: BPF prog-id=145 op=UNLOAD Feb 12 22:19:25.430000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.430000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.430000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.430000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.430000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.430000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.430000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.430000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.430000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.430000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:25.430000 audit: BPF prog-id=147 op=LOAD Feb 12 22:19:25.430000 audit[4093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002c5d68 items=0 ppid=3257 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:25.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363561333130636662633962623337623765336138613230636664 Feb 12 22:19:25.828040 kubelet[2597]: I0212 22:19:25.828016 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-74w6s" podStartSLOduration=-9.22337143602679e+09 pod.CreationTimestamp="2024-02-12 22:09:25 +0000 UTC" firstStartedPulling="2024-02-12 22:09:27.163215 +0000 UTC m=+19.019240652" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:19:25.827732669 +0000 UTC m=+617.683758329" watchObservedRunningTime="2024-02-12 22:19:25.827984739 +0000 UTC m=+617.684010392" Feb 12 22:19:25.899388 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 22:19:25.899467 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 22:19:27.046000 audit[4325]: AVC avc: denied { write } for pid=4325 comm="tee" name="fd" dev="proc" ino=50421 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:19:27.046000 audit[4323]: AVC avc: denied { write } for pid=4323 comm="tee" name="fd" dev="proc" ino=37614 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:19:27.046000 audit[4325]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd144ef965 a2=241 a3=1b6 items=1 ppid=4288 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.046000 audit[4323]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff8d58975 a2=241 a3=1b6 items=1 ppid=4289 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.046000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 22:19:27.046000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 22:19:27.046000 audit: PATH item=0 name="/dev/fd/63" inode=43579 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:19:27.046000 audit: PATH item=0 name="/dev/fd/63" inode=51388 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:19:27.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:19:27.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:19:27.046000 audit[4332]: AVC avc: denied { write } for pid=4332 comm="tee" name="fd" dev="proc" ino=35754 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:19:27.046000 audit[4332]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd07da0977 a2=241 a3=1b6 items=1 ppid=4293 pid=4332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.046000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 22:19:27.046000 audit: PATH item=0 name="/dev/fd/63" inode=35751 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:19:27.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:19:27.046000 audit[4333]: AVC avc: denied { write } for pid=4333 comm="tee" name="fd" dev="proc" ino=42667 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:19:27.046000 audit[4333]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd676bf975 a2=241 a3=1b6 items=1 ppid=4291 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.046000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 22:19:27.046000 audit: PATH item=0 name="/dev/fd/63" inode=42664 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:19:27.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:19:27.046000 audit[4334]: AVC avc: denied { write } for pid=4334 comm="tee" name="fd" dev="proc" ino=51392 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:19:27.046000 audit[4334]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc182ba976 a2=241 a3=1b6 items=1 ppid=4295 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.046000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 22:19:27.046000 audit: PATH item=0 name="/dev/fd/63" inode=54317 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:19:27.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:19:27.047000 audit[4336]: AVC avc: denied { write } for pid=4336 comm="tee" name="fd" dev="proc" ino=41682 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:19:27.047000 audit[4336]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc21ee966 a2=241 a3=1b6 items=1 ppid=4294 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.047000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 22:19:27.047000 audit: PATH item=0 name="/dev/fd/63" inode=51389 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:19:27.047000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:19:27.047000 audit[4322]: AVC avc: denied { write } for pid=4322 comm="tee" name="fd" dev="proc" ino=37618 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:19:27.047000 audit[4322]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde7c71975 a2=241 a3=1b6 items=1 ppid=4292 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.047000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 22:19:27.047000 audit: PATH item=0 name="/dev/fd/63" inode=41679 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:19:27.047000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit: BPF prog-id=148 op=LOAD Feb 12 22:19:27.135000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce794ee90 a2=70 a3=7f9b2dd6b000 items=0 ppid=4299 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.135000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:19:27.135000 audit: BPF prog-id=148 op=UNLOAD Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit: BPF prog-id=149 op=LOAD Feb 12 22:19:27.135000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce794ee90 a2=70 a3=6e items=0 ppid=4299 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.135000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:19:27.135000 audit: BPF prog-id=149 op=UNLOAD Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffce794ee40 a2=70 a3=7ffce794ee90 items=0 ppid=4299 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.135000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.135000 audit: BPF prog-id=150 op=LOAD Feb 12 22:19:27.135000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffce794ee20 a2=70 a3=7ffce794ee90 items=0 ppid=4299 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.135000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:19:27.136000 audit: BPF prog-id=150 op=UNLOAD Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce794ef00 a2=70 a3=0 items=0 ppid=4299 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.136000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce794eef0 a2=70 a3=0 items=0 ppid=4299 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.136000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffce794ef30 a2=70 a3=0 items=0 ppid=4299 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.136000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.136000 audit: BPF prog-id=151 op=LOAD Feb 12 22:19:27.136000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffce794ee50 a2=70 a3=ffffffff items=0 ppid=4299 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.136000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:19:27.137000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.137000 audit[4475]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd2be5690 a2=70 a3=fff80800 items=0 ppid=4299 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:19:27.137000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:27.137000 audit[4475]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd2be5560 a2=70 a3=3 items=0 ppid=4299 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:19:27.161000 audit: BPF prog-id=151 op=UNLOAD Feb 12 22:19:27.187000 audit[4530]: NETFILTER_CFG table=mangle:111 family=2 entries=19 op=nft_register_chain pid=4530 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:19:27.187000 audit[4530]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe48203030 a2=0 a3=7ffe4820301c items=0 ppid=4299 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.187000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:19:27.189000 audit[4531]: NETFILTER_CFG table=raw:112 family=2 entries=19 op=nft_register_chain pid=4531 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:19:27.189000 audit[4531]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff1f341370 a2=0 a3=55eb875a6000 items=0 ppid=4299 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.189000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:19:27.191000 audit[4532]: NETFILTER_CFG table=nat:113 family=2 entries=16 op=nft_register_chain pid=4532 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:19:27.191000 audit[4532]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe30dd5d80 a2=0 a3=55b2e092a000 items=0 ppid=4299 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.191000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:19:27.192000 audit[4534]: NETFILTER_CFG table=filter:114 family=2 entries=39 op=nft_register_chain pid=4534 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:19:27.192000 audit[4534]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fffb772d410 a2=0 a3=55d6166d1000 items=0 ppid=4299 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:27.192000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:19:28.129001 systemd-networkd[1314]: vxlan.calico: Link UP Feb 12 22:19:28.129013 systemd-networkd[1314]: vxlan.calico: Gained carrier Feb 12 22:19:28.901170 update_engine[1467]: I0212 22:19:28.901083 1467 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 12 22:19:28.901170 update_engine[1467]: I0212 22:19:28.901139 1467 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 12 22:19:28.901970 update_engine[1467]: I0212 22:19:28.901762 1467 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 12 22:19:28.902524 update_engine[1467]: I0212 22:19:28.902459 1467 omaha_request_params.cc:62] Current group set to lts Feb 12 22:19:28.902691 update_engine[1467]: I0212 22:19:28.902675 1467 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 12 22:19:28.902691 update_engine[1467]: I0212 22:19:28.902690 1467 update_attempter.cc:643] Scheduling an action processor start. Feb 12 22:19:28.902904 update_engine[1467]: I0212 22:19:28.902716 1467 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 12 22:19:28.902904 update_engine[1467]: I0212 22:19:28.902778 1467 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 12 22:19:28.903129 update_engine[1467]: I0212 22:19:28.902915 1467 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 12 22:19:28.903129 update_engine[1467]: I0212 22:19:28.902946 1467 omaha_request_action.cc:271] Request: Feb 12 22:19:28.903129 update_engine[1467]: Feb 12 22:19:28.903129 update_engine[1467]: Feb 12 22:19:28.903129 update_engine[1467]: Feb 12 22:19:28.903129 update_engine[1467]: Feb 12 22:19:28.903129 update_engine[1467]: Feb 12 22:19:28.903129 update_engine[1467]: Feb 12 22:19:28.903129 update_engine[1467]: Feb 12 22:19:28.903129 update_engine[1467]: Feb 12 22:19:28.903129 update_engine[1467]: I0212 22:19:28.902958 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 22:19:28.904233 locksmithd[1512]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 12 22:19:28.905671 update_engine[1467]: I0212 22:19:28.905635 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 22:19:28.905815 update_engine[1467]: E0212 22:19:28.905800 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 22:19:28.906025 update_engine[1467]: I0212 22:19:28.905912 1467 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 12 22:19:29.646219 systemd-networkd[1314]: vxlan.calico: Gained IPv6LL Feb 12 22:19:35.256793 env[1477]: time="2024-02-12T22:19:35.256706189Z" level=info msg="StopPodSandbox for \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\"" Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.347 [INFO][4568] k8s.go 578: Cleaning up netns ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.347 [INFO][4568] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" iface="eth0" netns="/var/run/netns/cni-562caed7-6cd1-83b6-7c1b-037f51aa6ac1" Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.348 [INFO][4568] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" iface="eth0" netns="/var/run/netns/cni-562caed7-6cd1-83b6-7c1b-037f51aa6ac1" Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.348 [INFO][4568] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" iface="eth0" netns="/var/run/netns/cni-562caed7-6cd1-83b6-7c1b-037f51aa6ac1" Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.348 [INFO][4568] k8s.go 585: Releasing IP address(es) ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.348 [INFO][4568] utils.go 188: Calico CNI releasing IP address ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.381 [INFO][4582] ipam_plugin.go 415: Releasing address using handleID ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" HandleID="k8s-pod-network.aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.381 [INFO][4582] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.381 [INFO][4582] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.389 [WARNING][4582] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" HandleID="k8s-pod-network.aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.389 [INFO][4582] ipam_plugin.go 443: Releasing address using workloadID ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" HandleID="k8s-pod-network.aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.391 [INFO][4582] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:19:35.397734 env[1477]: 2024-02-12 22:19:35.394 [INFO][4568] k8s.go 591: Teardown processing complete. ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:19:35.400157 env[1477]: time="2024-02-12T22:19:35.398018204Z" level=info msg="TearDown network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\" successfully" Feb 12 22:19:35.400157 env[1477]: time="2024-02-12T22:19:35.398095379Z" level=info msg="StopPodSandbox for \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\" returns successfully" Feb 12 22:19:35.400157 env[1477]: time="2024-02-12T22:19:35.399470457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mxz9p,Uid:626b6a1d-cf78-40dc-b919-7e003fb6b49d,Namespace:kube-system,Attempt:1,}" Feb 12 22:19:35.404689 systemd[1]: run-netns-cni\x2d562caed7\x2d6cd1\x2d83b6\x2d7c1b\x2d037f51aa6ac1.mount: Deactivated successfully. Feb 12 22:19:35.514846 systemd-networkd[1314]: calid780c6e5bd1: Link UP Feb 12 22:19:35.571066 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:19:35.571105 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid780c6e5bd1: link becomes ready Feb 12 22:19:35.571166 systemd-networkd[1314]: calid780c6e5bd1: Gained carrier Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.446 [INFO][4601] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0 coredns-787d4945fb- kube-system 626b6a1d-cf78-40dc-b919-7e003fb6b49d 1754 0 2024-02-12 22:09:21 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-0de130baf6 coredns-787d4945fb-mxz9p eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid780c6e5bd1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Namespace="kube-system" Pod="coredns-787d4945fb-mxz9p" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.446 [INFO][4601] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Namespace="kube-system" Pod="coredns-787d4945fb-mxz9p" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.473 [INFO][4624] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" HandleID="k8s-pod-network.61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.484 [INFO][4624] ipam_plugin.go 268: Auto assigning IP ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" HandleID="k8s-pod-network.61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029dd00), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-0de130baf6", "pod":"coredns-787d4945fb-mxz9p", "timestamp":"2024-02-12 22:19:35.473938388 +0000 UTC"}, Hostname:"ci-3510.3.2-a-0de130baf6", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.485 [INFO][4624] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.485 [INFO][4624] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.485 [INFO][4624] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-0de130baf6' Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.487 [INFO][4624] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.491 [INFO][4624] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.496 [INFO][4624] ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.498 [INFO][4624] ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.500 [INFO][4624] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.500 [INFO][4624] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.502 [INFO][4624] ipam.go 1682: Creating new handle: k8s-pod-network.61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8 Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.505 [INFO][4624] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.509 [INFO][4624] ipam.go 1216: Successfully claimed IPs: [192.168.64.65/26] block=192.168.64.64/26 handle="k8s-pod-network.61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.510 [INFO][4624] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.65/26] handle="k8s-pod-network.61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.510 [INFO][4624] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:19:35.576154 env[1477]: 2024-02-12 22:19:35.510 [INFO][4624] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.65/26] IPv6=[] ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" HandleID="k8s-pod-network.61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:19:35.577071 env[1477]: 2024-02-12 22:19:35.513 [INFO][4601] k8s.go 385: Populated endpoint ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Namespace="kube-system" Pod="coredns-787d4945fb-mxz9p" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"626b6a1d-cf78-40dc-b919-7e003fb6b49d", ResourceVersion:"1754", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"", Pod:"coredns-787d4945fb-mxz9p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid780c6e5bd1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:19:35.577071 env[1477]: 2024-02-12 22:19:35.513 [INFO][4601] k8s.go 386: Calico CNI using IPs: [192.168.64.65/32] ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Namespace="kube-system" Pod="coredns-787d4945fb-mxz9p" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:19:35.577071 env[1477]: 2024-02-12 22:19:35.513 [INFO][4601] dataplane_linux.go 68: Setting the host side veth name to calid780c6e5bd1 ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Namespace="kube-system" Pod="coredns-787d4945fb-mxz9p" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:19:35.577071 env[1477]: 2024-02-12 22:19:35.515 [INFO][4601] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Namespace="kube-system" Pod="coredns-787d4945fb-mxz9p" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:19:35.577071 env[1477]: 2024-02-12 22:19:35.571 [INFO][4601] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Namespace="kube-system" Pod="coredns-787d4945fb-mxz9p" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"626b6a1d-cf78-40dc-b919-7e003fb6b49d", ResourceVersion:"1754", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8", Pod:"coredns-787d4945fb-mxz9p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid780c6e5bd1", MAC:"c6:d8:ed:17:27:8e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:19:35.577071 env[1477]: 2024-02-12 22:19:35.575 [INFO][4601] k8s.go 491: Wrote updated endpoint to datastore ContainerID="61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8" Namespace="kube-system" Pod="coredns-787d4945fb-mxz9p" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:19:35.581809 env[1477]: time="2024-02-12T22:19:35.581771015Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:19:35.581809 env[1477]: time="2024-02-12T22:19:35.581793011Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:19:35.581809 env[1477]: time="2024-02-12T22:19:35.581803305Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:19:35.581984 env[1477]: time="2024-02-12T22:19:35.581869215Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8 pid=4667 runtime=io.containerd.runc.v2 Feb 12 22:19:35.582000 audit[4678]: NETFILTER_CFG table=filter:115 family=2 entries=36 op=nft_register_chain pid=4678 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:19:35.588532 systemd[1]: Started cri-containerd-61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8.scope. Feb 12 22:19:35.609928 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 12 22:19:35.609965 kernel: audit: type=1325 audit(1707776375.582:1351): table=filter:115 family=2 entries=36 op=nft_register_chain pid=4678 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:19:35.582000 audit[4678]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd3a44ab30 a2=0 a3=7ffd3a44ab1c items=0 ppid=4299 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:35.763177 kernel: audit: type=1300 audit(1707776375.582:1351): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd3a44ab30 a2=0 a3=7ffd3a44ab1c items=0 ppid=4299 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:35.763231 kernel: audit: type=1327 audit(1707776375.582:1351): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:19:35.582000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:19:35.823790 kernel: audit: type=1400 audit(1707776375.674:1352): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.948251 kernel: audit: type=1400 audit(1707776375.674:1353): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.948283 kernel: audit: type=1400 audit(1707776375.674:1354): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.010517 kernel: audit: type=1400 audit(1707776375.674:1355): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.073093 kernel: audit: type=1400 audit(1707776375.674:1356): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.135789 kernel: audit: type=1400 audit(1707776375.674:1357): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.198517 kernel: audit: type=1400 audit(1707776375.674:1358): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.255275 env[1477]: time="2024-02-12T22:19:36.255256143Z" level=info msg="StopPodSandbox for \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\"" Feb 12 22:19:35.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.822000 audit: BPF prog-id=152 op=LOAD Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4667 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:35.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613261396530373935346464353264313731646231306430313438 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4667 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:35.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613261396530373935346464353264313731646231306430313438 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.823000 audit: BPF prog-id=153 op=LOAD Feb 12 22:19:35.823000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000325a70 items=0 ppid=4667 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:35.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613261396530373935346464353264313731646231306430313438 Feb 12 22:19:35.885000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.885000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.885000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.885000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.885000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.885000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.885000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.885000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.885000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:35.885000 audit: BPF prog-id=154 op=LOAD Feb 12 22:19:35.885000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000325ab8 items=0 ppid=4667 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:35.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613261396530373935346464353264313731646231306430313438 Feb 12 22:19:36.009000 audit: BPF prog-id=154 op=UNLOAD Feb 12 22:19:36.009000 audit: BPF prog-id=153 op=UNLOAD Feb 12 22:19:36.009000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.009000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.009000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.009000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.009000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.009000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.009000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.009000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.009000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.009000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.009000 audit: BPF prog-id=155 op=LOAD Feb 12 22:19:36.009000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000325ec8 items=0 ppid=4667 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613261396530373935346464353264313731646231306430313438 Feb 12 22:19:36.277801 env[1477]: time="2024-02-12T22:19:36.277774766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mxz9p,Uid:626b6a1d-cf78-40dc-b919-7e003fb6b49d,Namespace:kube-system,Attempt:1,} returns sandbox id \"61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8\"" Feb 12 22:19:36.278982 env[1477]: time="2024-02-12T22:19:36.278966265Z" level=info msg="CreateContainer within sandbox \"61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 22:19:36.283387 env[1477]: time="2024-02-12T22:19:36.283360736Z" level=info msg="CreateContainer within sandbox \"61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"cfdafdbe75468ce48b67141dbc6f56ccabbce6b842891d4c8f01d66f5664e348\"" Feb 12 22:19:36.283667 env[1477]: time="2024-02-12T22:19:36.283653282Z" level=info msg="StartContainer for \"cfdafdbe75468ce48b67141dbc6f56ccabbce6b842891d4c8f01d66f5664e348\"" Feb 12 22:19:36.290828 systemd[1]: Started cri-containerd-cfdafdbe75468ce48b67141dbc6f56ccabbce6b842891d4c8f01d66f5664e348.scope. Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.276 [INFO][4712] k8s.go 578: Cleaning up netns ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.276 [INFO][4712] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" iface="eth0" netns="/var/run/netns/cni-7daeeeaa-b0f8-9139-f8b5-4c1d886b540b" Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.277 [INFO][4712] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" iface="eth0" netns="/var/run/netns/cni-7daeeeaa-b0f8-9139-f8b5-4c1d886b540b" Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.277 [INFO][4712] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" iface="eth0" netns="/var/run/netns/cni-7daeeeaa-b0f8-9139-f8b5-4c1d886b540b" Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.277 [INFO][4712] k8s.go 585: Releasing IP address(es) ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.277 [INFO][4712] utils.go 188: Calico CNI releasing IP address ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.287 [INFO][4737] ipam_plugin.go 415: Releasing address using handleID ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" HandleID="k8s-pod-network.8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.287 [INFO][4737] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.287 [INFO][4737] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.291 [WARNING][4737] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" HandleID="k8s-pod-network.8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.291 [INFO][4737] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" HandleID="k8s-pod-network.8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.292 [INFO][4737] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:19:36.293969 env[1477]: 2024-02-12 22:19:36.293 [INFO][4712] k8s.go 591: Teardown processing complete. ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:19:36.294291 env[1477]: time="2024-02-12T22:19:36.294038747Z" level=info msg="TearDown network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\" successfully" Feb 12 22:19:36.294291 env[1477]: time="2024-02-12T22:19:36.294056828Z" level=info msg="StopPodSandbox for \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\" returns successfully" Feb 12 22:19:36.294396 env[1477]: time="2024-02-12T22:19:36.294382176Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-kh6pd,Uid:50c42a46-815d-42a9-933b-f2f227f8c5a7,Namespace:kube-system,Attempt:1,}" Feb 12 22:19:36.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit: BPF prog-id=156 op=LOAD Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4667 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646166646265373534363863653438623637313431646263366635 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4667 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646166646265373534363863653438623637313431646263366635 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit: BPF prog-id=157 op=LOAD Feb 12 22:19:36.297000 audit[4757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e1d40 items=0 ppid=4667 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646166646265373534363863653438623637313431646263366635 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit: BPF prog-id=158 op=LOAD Feb 12 22:19:36.297000 audit[4757]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e1d88 items=0 ppid=4667 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646166646265373534363863653438623637313431646263366635 Feb 12 22:19:36.297000 audit: BPF prog-id=158 op=UNLOAD Feb 12 22:19:36.297000 audit: BPF prog-id=157 op=UNLOAD Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { perfmon } for pid=4757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit[4757]: AVC avc: denied { bpf } for pid=4757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.297000 audit: BPF prog-id=159 op=LOAD Feb 12 22:19:36.297000 audit[4757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca198 items=0 ppid=4667 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646166646265373534363863653438623637313431646263366635 Feb 12 22:19:36.303889 env[1477]: time="2024-02-12T22:19:36.303850844Z" level=info msg="StartContainer for \"cfdafdbe75468ce48b67141dbc6f56ccabbce6b842891d4c8f01d66f5664e348\" returns successfully" Feb 12 22:19:36.352124 systemd-networkd[1314]: calif7d8dd00d53: Link UP Feb 12 22:19:36.380762 systemd-networkd[1314]: calif7d8dd00d53: Gained carrier Feb 12 22:19:36.380930 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif7d8dd00d53: link becomes ready Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.315 [INFO][4778] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0 coredns-787d4945fb- kube-system 50c42a46-815d-42a9-933b-f2f227f8c5a7 1760 0 2024-02-12 22:09:21 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-0de130baf6 coredns-787d4945fb-kh6pd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif7d8dd00d53 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Namespace="kube-system" Pod="coredns-787d4945fb-kh6pd" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.316 [INFO][4778] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Namespace="kube-system" Pod="coredns-787d4945fb-kh6pd" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.328 [INFO][4824] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" HandleID="k8s-pod-network.0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.334 [INFO][4824] ipam_plugin.go 268: Auto assigning IP ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" HandleID="k8s-pod-network.0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c1fd0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-0de130baf6", "pod":"coredns-787d4945fb-kh6pd", "timestamp":"2024-02-12 22:19:36.328847248 +0000 UTC"}, Hostname:"ci-3510.3.2-a-0de130baf6", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.334 [INFO][4824] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.334 [INFO][4824] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.334 [INFO][4824] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-0de130baf6' Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.335 [INFO][4824] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.339 [INFO][4824] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.341 [INFO][4824] ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.343 [INFO][4824] ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.344 [INFO][4824] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.344 [INFO][4824] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.345 [INFO][4824] ipam.go 1682: Creating new handle: k8s-pod-network.0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5 Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.347 [INFO][4824] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.350 [INFO][4824] ipam.go 1216: Successfully claimed IPs: [192.168.64.66/26] block=192.168.64.64/26 handle="k8s-pod-network.0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.350 [INFO][4824] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.66/26] handle="k8s-pod-network.0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.350 [INFO][4824] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:19:36.385864 env[1477]: 2024-02-12 22:19:36.350 [INFO][4824] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.66/26] IPv6=[] ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" HandleID="k8s-pod-network.0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:19:36.386363 env[1477]: 2024-02-12 22:19:36.351 [INFO][4778] k8s.go 385: Populated endpoint ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Namespace="kube-system" Pod="coredns-787d4945fb-kh6pd" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"50c42a46-815d-42a9-933b-f2f227f8c5a7", ResourceVersion:"1760", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"", Pod:"coredns-787d4945fb-kh6pd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7d8dd00d53", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:19:36.386363 env[1477]: 2024-02-12 22:19:36.351 [INFO][4778] k8s.go 386: Calico CNI using IPs: [192.168.64.66/32] ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Namespace="kube-system" Pod="coredns-787d4945fb-kh6pd" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:19:36.386363 env[1477]: 2024-02-12 22:19:36.351 [INFO][4778] dataplane_linux.go 68: Setting the host side veth name to calif7d8dd00d53 ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Namespace="kube-system" Pod="coredns-787d4945fb-kh6pd" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:19:36.386363 env[1477]: 2024-02-12 22:19:36.380 [INFO][4778] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Namespace="kube-system" Pod="coredns-787d4945fb-kh6pd" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:19:36.386363 env[1477]: 2024-02-12 22:19:36.380 [INFO][4778] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Namespace="kube-system" Pod="coredns-787d4945fb-kh6pd" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"50c42a46-815d-42a9-933b-f2f227f8c5a7", ResourceVersion:"1760", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5", Pod:"coredns-787d4945fb-kh6pd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7d8dd00d53", MAC:"b6:82:31:58:09:94", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:19:36.386363 env[1477]: 2024-02-12 22:19:36.384 [INFO][4778] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5" Namespace="kube-system" Pod="coredns-787d4945fb-kh6pd" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:19:36.391961 env[1477]: time="2024-02-12T22:19:36.391903050Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:19:36.391961 env[1477]: time="2024-02-12T22:19:36.391928779Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:19:36.391961 env[1477]: time="2024-02-12T22:19:36.391938760Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:19:36.392075 env[1477]: time="2024-02-12T22:19:36.392003845Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5 pid=4860 runtime=io.containerd.runc.v2 Feb 12 22:19:36.391000 audit[4861]: NETFILTER_CFG table=filter:116 family=2 entries=30 op=nft_register_chain pid=4861 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:19:36.391000 audit[4861]: SYSCALL arch=c000003e syscall=46 success=yes exit=16712 a0=3 a1=7ffcaa942900 a2=0 a3=7ffcaa9428ec items=0 ppid=4299 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.391000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:19:36.397760 systemd[1]: Started cri-containerd-0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5.scope. Feb 12 22:19:36.401019 systemd[1]: run-netns-cni\x2d7daeeeaa\x2db0f8\x2d9139\x2df8b5\x2d4c1d886b540b.mount: Deactivated successfully. Feb 12 22:19:36.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit: BPF prog-id=160 op=LOAD Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4860 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064396239326464303839343336323065323465353933303134323337 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4860 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064396239326464303839343336323065323465353933303134323337 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit: BPF prog-id=161 op=LOAD Feb 12 22:19:36.403000 audit[4870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00038a560 items=0 ppid=4860 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064396239326464303839343336323065323465353933303134323337 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit: BPF prog-id=162 op=LOAD Feb 12 22:19:36.403000 audit[4870]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00038a5a8 items=0 ppid=4860 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064396239326464303839343336323065323465353933303134323337 Feb 12 22:19:36.403000 audit: BPF prog-id=162 op=UNLOAD Feb 12 22:19:36.403000 audit: BPF prog-id=161 op=UNLOAD Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.403000 audit: BPF prog-id=163 op=LOAD Feb 12 22:19:36.403000 audit[4870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00038a9b8 items=0 ppid=4860 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064396239326464303839343336323065323465353933303134323337 Feb 12 22:19:36.421441 env[1477]: time="2024-02-12T22:19:36.421412875Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-kh6pd,Uid:50c42a46-815d-42a9-933b-f2f227f8c5a7,Namespace:kube-system,Attempt:1,} returns sandbox id \"0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5\"" Feb 12 22:19:36.422651 env[1477]: time="2024-02-12T22:19:36.422638152Z" level=info msg="CreateContainer within sandbox \"0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 22:19:36.427091 env[1477]: time="2024-02-12T22:19:36.427074381Z" level=info msg="CreateContainer within sandbox \"0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"df4aa25d0c865f40059f45b57bcf9094050ebcbe1dbbc97caaa9127a598b836f\"" Feb 12 22:19:36.427305 env[1477]: time="2024-02-12T22:19:36.427290098Z" level=info msg="StartContainer for \"df4aa25d0c865f40059f45b57bcf9094050ebcbe1dbbc97caaa9127a598b836f\"" Feb 12 22:19:36.435703 systemd[1]: Started cri-containerd-df4aa25d0c865f40059f45b57bcf9094050ebcbe1dbbc97caaa9127a598b836f.scope. Feb 12 22:19:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit: BPF prog-id=164 op=LOAD Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4860 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466346161323564306338363566343030353966343562353762636639 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4860 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466346161323564306338363566343030353966343562353762636639 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit: BPF prog-id=165 op=LOAD Feb 12 22:19:36.440000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002129f0 items=0 ppid=4860 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466346161323564306338363566343030353966343562353762636639 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit: BPF prog-id=166 op=LOAD Feb 12 22:19:36.440000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000212a38 items=0 ppid=4860 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466346161323564306338363566343030353966343562353762636639 Feb 12 22:19:36.440000 audit: BPF prog-id=166 op=UNLOAD Feb 12 22:19:36.440000 audit: BPF prog-id=165 op=UNLOAD Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:36.440000 audit: BPF prog-id=167 op=LOAD Feb 12 22:19:36.440000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000212e48 items=0 ppid=4860 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466346161323564306338363566343030353966343562353762636639 Feb 12 22:19:36.447617 env[1477]: time="2024-02-12T22:19:36.447591198Z" level=info msg="StartContainer for \"df4aa25d0c865f40059f45b57bcf9094050ebcbe1dbbc97caaa9127a598b836f\" returns successfully" Feb 12 22:19:36.814514 systemd-networkd[1314]: calid780c6e5bd1: Gained IPv6LL Feb 12 22:19:36.890538 kubelet[2597]: I0212 22:19:36.890442 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-kh6pd" podStartSLOduration=615.890361177 pod.CreationTimestamp="2024-02-12 22:09:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:19:36.86931876 +0000 UTC m=+628.725344480" watchObservedRunningTime="2024-02-12 22:19:36.890361177 +0000 UTC m=+628.746386877" Feb 12 22:19:36.909031 kubelet[2597]: I0212 22:19:36.908990 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-mxz9p" podStartSLOduration=615.908910509 pod.CreationTimestamp="2024-02-12 22:09:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:19:36.908370153 +0000 UTC m=+628.764395836" watchObservedRunningTime="2024-02-12 22:19:36.908910509 +0000 UTC m=+628.764936184" Feb 12 22:19:36.934000 audit[4967]: NETFILTER_CFG table=filter:117 family=2 entries=12 op=nft_register_rule pid=4967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:19:36.934000 audit[4967]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffcd8571340 a2=0 a3=7ffcd857132c items=0 ppid=2903 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:19:36.935000 audit[4967]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=4967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:19:36.935000 audit[4967]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffcd8571340 a2=0 a3=7ffcd857132c items=0 ppid=2903 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:19:36.989000 audit[4993]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:19:36.989000 audit[4993]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd17f46530 a2=0 a3=7ffd17f4651c items=0 ppid=2903 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:19:36.994000 audit[4993]: NETFILTER_CFG table=nat:120 family=2 entries=63 op=nft_register_chain pid=4993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:19:36.994000 audit[4993]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd17f46530 a2=0 a3=7ffd17f4651c items=0 ppid=2903 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:36.994000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:19:37.256572 env[1477]: time="2024-02-12T22:19:37.256443063Z" level=info msg="StopPodSandbox for \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\"" Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.346 [INFO][5018] k8s.go 578: Cleaning up netns ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.347 [INFO][5018] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" iface="eth0" netns="/var/run/netns/cni-3b07686e-a60c-ffc2-5d34-e819a45e0748" Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.347 [INFO][5018] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" iface="eth0" netns="/var/run/netns/cni-3b07686e-a60c-ffc2-5d34-e819a45e0748" Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.348 [INFO][5018] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" iface="eth0" netns="/var/run/netns/cni-3b07686e-a60c-ffc2-5d34-e819a45e0748" Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.348 [INFO][5018] k8s.go 585: Releasing IP address(es) ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.348 [INFO][5018] utils.go 188: Calico CNI releasing IP address ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.388 [INFO][5036] ipam_plugin.go 415: Releasing address using handleID ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" HandleID="k8s-pod-network.9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.388 [INFO][5036] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.388 [INFO][5036] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.395 [WARNING][5036] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" HandleID="k8s-pod-network.9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.395 [INFO][5036] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" HandleID="k8s-pod-network.9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.397 [INFO][5036] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:19:37.399200 env[1477]: 2024-02-12 22:19:37.398 [INFO][5018] k8s.go 591: Teardown processing complete. ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:19:37.399865 env[1477]: time="2024-02-12T22:19:37.399319501Z" level=info msg="TearDown network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\" successfully" Feb 12 22:19:37.399865 env[1477]: time="2024-02-12T22:19:37.399356767Z" level=info msg="StopPodSandbox for \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\" returns successfully" Feb 12 22:19:37.399942 env[1477]: time="2024-02-12T22:19:37.399877275Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-242vw,Uid:d69383b0-7b9e-4b37-94b0-ee606e362b74,Namespace:calico-system,Attempt:1,}" Feb 12 22:19:37.402576 systemd[1]: run-netns-cni\x2d3b07686e\x2da60c\x2dffc2\x2d5d34\x2de819a45e0748.mount: Deactivated successfully. Feb 12 22:19:37.508273 systemd-networkd[1314]: calid5e2c3b7045: Link UP Feb 12 22:19:37.575830 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:19:37.575869 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid5e2c3b7045: link becomes ready Feb 12 22:19:37.575937 systemd-networkd[1314]: calid5e2c3b7045: Gained carrier Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.439 [INFO][5055] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0 csi-node-driver- calico-system d69383b0-7b9e-4b37-94b0-ee606e362b74 1790 0 2024-02-12 22:09:26 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-0de130baf6 csi-node-driver-242vw eth0 default [] [] [kns.calico-system ksa.calico-system.default] calid5e2c3b7045 [] []}} ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Namespace="calico-system" Pod="csi-node-driver-242vw" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.439 [INFO][5055] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Namespace="calico-system" Pod="csi-node-driver-242vw" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.462 [INFO][5078] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" HandleID="k8s-pod-network.810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.472 [INFO][5078] ipam_plugin.go 268: Auto assigning IP ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" HandleID="k8s-pod-network.810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000514e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-0de130baf6", "pod":"csi-node-driver-242vw", "timestamp":"2024-02-12 22:19:37.462312964 +0000 UTC"}, Hostname:"ci-3510.3.2-a-0de130baf6", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.472 [INFO][5078] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.472 [INFO][5078] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.472 [INFO][5078] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-0de130baf6' Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.474 [INFO][5078] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.477 [INFO][5078] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.481 [INFO][5078] ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.483 [INFO][5078] ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.485 [INFO][5078] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.485 [INFO][5078] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.486 [INFO][5078] ipam.go 1682: Creating new handle: k8s-pod-network.810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3 Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.491 [INFO][5078] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.500 [INFO][5078] ipam.go 1216: Successfully claimed IPs: [192.168.64.67/26] block=192.168.64.64/26 handle="k8s-pod-network.810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.501 [INFO][5078] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.67/26] handle="k8s-pod-network.810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.501 [INFO][5078] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:19:37.581170 env[1477]: 2024-02-12 22:19:37.501 [INFO][5078] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.67/26] IPv6=[] ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" HandleID="k8s-pod-network.810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:19:37.581674 env[1477]: 2024-02-12 22:19:37.504 [INFO][5055] k8s.go 385: Populated endpoint ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Namespace="calico-system" Pod="csi-node-driver-242vw" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d69383b0-7b9e-4b37-94b0-ee606e362b74", ResourceVersion:"1790", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"", Pod:"csi-node-driver-242vw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid5e2c3b7045", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:19:37.581674 env[1477]: 2024-02-12 22:19:37.505 [INFO][5055] k8s.go 386: Calico CNI using IPs: [192.168.64.67/32] ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Namespace="calico-system" Pod="csi-node-driver-242vw" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:19:37.581674 env[1477]: 2024-02-12 22:19:37.505 [INFO][5055] dataplane_linux.go 68: Setting the host side veth name to calid5e2c3b7045 ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Namespace="calico-system" Pod="csi-node-driver-242vw" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:19:37.581674 env[1477]: 2024-02-12 22:19:37.575 [INFO][5055] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Namespace="calico-system" Pod="csi-node-driver-242vw" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:19:37.581674 env[1477]: 2024-02-12 22:19:37.575 [INFO][5055] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Namespace="calico-system" Pod="csi-node-driver-242vw" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d69383b0-7b9e-4b37-94b0-ee606e362b74", ResourceVersion:"1790", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3", Pod:"csi-node-driver-242vw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid5e2c3b7045", MAC:"4e:5f:9f:f4:b8:98", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:19:37.581674 env[1477]: 2024-02-12 22:19:37.580 [INFO][5055] k8s.go 491: Wrote updated endpoint to datastore ContainerID="810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3" Namespace="calico-system" Pod="csi-node-driver-242vw" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:19:37.586000 audit[5113]: NETFILTER_CFG table=filter:121 family=2 entries=50 op=nft_register_chain pid=5113 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:19:37.586000 audit[5113]: SYSCALL arch=c000003e syscall=46 success=yes exit=25136 a0=3 a1=7ffc24363b40 a2=0 a3=7ffc24363b2c items=0 ppid=4299 pid=5113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:37.586000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:19:37.614762 env[1477]: time="2024-02-12T22:19:37.614545490Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:19:37.614762 env[1477]: time="2024-02-12T22:19:37.614634794Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:19:37.614762 env[1477]: time="2024-02-12T22:19:37.614670085Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:19:37.615194 env[1477]: time="2024-02-12T22:19:37.615064225Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3 pid=5121 runtime=io.containerd.runc.v2 Feb 12 22:19:37.641071 systemd[1]: Started cri-containerd-810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3.scope. Feb 12 22:19:37.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.665000 audit: BPF prog-id=168 op=LOAD Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=5121 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:37.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831306339623033316539316430386562333630313735313361333162 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=5121 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:37.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831306339623033316539316430386562333630313735313361333162 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.666000 audit: BPF prog-id=169 op=LOAD Feb 12 22:19:37.666000 audit[5131]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001c0100 items=0 ppid=5121 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:37.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831306339623033316539316430386562333630313735313361333162 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit: BPF prog-id=170 op=LOAD Feb 12 22:19:37.667000 audit[5131]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001c0148 items=0 ppid=5121 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:37.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831306339623033316539316430386562333630313735313361333162 Feb 12 22:19:37.667000 audit: BPF prog-id=170 op=UNLOAD Feb 12 22:19:37.667000 audit: BPF prog-id=169 op=UNLOAD Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:37.667000 audit: BPF prog-id=171 op=LOAD Feb 12 22:19:37.667000 audit[5131]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001c0558 items=0 ppid=5121 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:37.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831306339623033316539316430386562333630313735313361333162 Feb 12 22:19:37.687545 env[1477]: time="2024-02-12T22:19:37.687455415Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-242vw,Uid:d69383b0-7b9e-4b37-94b0-ee606e362b74,Namespace:calico-system,Attempt:1,} returns sandbox id \"810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3\"" Feb 12 22:19:37.690476 env[1477]: time="2024-02-12T22:19:37.690370442Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 22:19:37.774252 systemd-networkd[1314]: calif7d8dd00d53: Gained IPv6LL Feb 12 22:19:38.257764 env[1477]: time="2024-02-12T22:19:38.257614524Z" level=info msg="StopPodSandbox for \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\"" Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.328 [INFO][5171] k8s.go 578: Cleaning up netns ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.328 [INFO][5171] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" iface="eth0" netns="/var/run/netns/cni-deebd207-a98c-fd69-ea6c-e42ab162babf" Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.328 [INFO][5171] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" iface="eth0" netns="/var/run/netns/cni-deebd207-a98c-fd69-ea6c-e42ab162babf" Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.329 [INFO][5171] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" iface="eth0" netns="/var/run/netns/cni-deebd207-a98c-fd69-ea6c-e42ab162babf" Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.329 [INFO][5171] k8s.go 585: Releasing IP address(es) ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.329 [INFO][5171] utils.go 188: Calico CNI releasing IP address ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.345 [INFO][5190] ipam_plugin.go 415: Releasing address using handleID ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" HandleID="k8s-pod-network.8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.346 [INFO][5190] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.346 [INFO][5190] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.352 [WARNING][5190] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" HandleID="k8s-pod-network.8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.352 [INFO][5190] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" HandleID="k8s-pod-network.8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.353 [INFO][5190] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:19:38.355702 env[1477]: 2024-02-12 22:19:38.354 [INFO][5171] k8s.go 591: Teardown processing complete. ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:19:38.356313 env[1477]: time="2024-02-12T22:19:38.355814434Z" level=info msg="TearDown network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\" successfully" Feb 12 22:19:38.356313 env[1477]: time="2024-02-12T22:19:38.355848357Z" level=info msg="StopPodSandbox for \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\" returns successfully" Feb 12 22:19:38.356395 env[1477]: time="2024-02-12T22:19:38.356334074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5588694d89-69h2v,Uid:8af8906d-f36b-4a21-828c-b5c53165f945,Namespace:calico-system,Attempt:1,}" Feb 12 22:19:38.406726 systemd[1]: run-netns-cni\x2ddeebd207\x2da98c\x2dfd69\x2dea6c\x2de42ab162babf.mount: Deactivated successfully. Feb 12 22:19:38.506283 systemd-networkd[1314]: cali32fcfa959a8: Link UP Feb 12 22:19:38.538353 systemd-networkd[1314]: cali32fcfa959a8: Gained carrier Feb 12 22:19:38.538935 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali32fcfa959a8: link becomes ready Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.419 [INFO][5205] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0 calico-kube-controllers-5588694d89- calico-system 8af8906d-f36b-4a21-828c-b5c53165f945 1798 0 2024-02-12 22:09:26 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5588694d89 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-0de130baf6 calico-kube-controllers-5588694d89-69h2v eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali32fcfa959a8 [] []}} ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Namespace="calico-system" Pod="calico-kube-controllers-5588694d89-69h2v" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.419 [INFO][5205] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Namespace="calico-system" Pod="calico-kube-controllers-5588694d89-69h2v" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.454 [INFO][5229] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" HandleID="k8s-pod-network.36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.469 [INFO][5229] ipam_plugin.go 268: Auto assigning IP ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" HandleID="k8s-pod-network.36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00072b6b0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-0de130baf6", "pod":"calico-kube-controllers-5588694d89-69h2v", "timestamp":"2024-02-12 22:19:38.454300466 +0000 UTC"}, Hostname:"ci-3510.3.2-a-0de130baf6", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.470 [INFO][5229] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.470 [INFO][5229] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.470 [INFO][5229] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-0de130baf6' Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.472 [INFO][5229] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.477 [INFO][5229] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.482 [INFO][5229] ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.485 [INFO][5229] ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.488 [INFO][5229] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.488 [INFO][5229] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.490 [INFO][5229] ipam.go 1682: Creating new handle: k8s-pod-network.36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228 Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.495 [INFO][5229] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.502 [INFO][5229] ipam.go 1216: Successfully claimed IPs: [192.168.64.68/26] block=192.168.64.64/26 handle="k8s-pod-network.36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.502 [INFO][5229] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.68/26] handle="k8s-pod-network.36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.502 [INFO][5229] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:19:38.547092 env[1477]: 2024-02-12 22:19:38.502 [INFO][5229] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.68/26] IPv6=[] ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" HandleID="k8s-pod-network.36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:19:38.547864 env[1477]: 2024-02-12 22:19:38.504 [INFO][5205] k8s.go 385: Populated endpoint ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Namespace="calico-system" Pod="calico-kube-controllers-5588694d89-69h2v" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0", GenerateName:"calico-kube-controllers-5588694d89-", Namespace:"calico-system", SelfLink:"", UID:"8af8906d-f36b-4a21-828c-b5c53165f945", ResourceVersion:"1798", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5588694d89", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"", Pod:"calico-kube-controllers-5588694d89-69h2v", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32fcfa959a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:19:38.547864 env[1477]: 2024-02-12 22:19:38.504 [INFO][5205] k8s.go 386: Calico CNI using IPs: [192.168.64.68/32] ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Namespace="calico-system" Pod="calico-kube-controllers-5588694d89-69h2v" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:19:38.547864 env[1477]: 2024-02-12 22:19:38.504 [INFO][5205] dataplane_linux.go 68: Setting the host side veth name to cali32fcfa959a8 ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Namespace="calico-system" Pod="calico-kube-controllers-5588694d89-69h2v" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:19:38.547864 env[1477]: 2024-02-12 22:19:38.538 [INFO][5205] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Namespace="calico-system" Pod="calico-kube-controllers-5588694d89-69h2v" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:19:38.547864 env[1477]: 2024-02-12 22:19:38.538 [INFO][5205] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Namespace="calico-system" Pod="calico-kube-controllers-5588694d89-69h2v" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0", GenerateName:"calico-kube-controllers-5588694d89-", Namespace:"calico-system", SelfLink:"", UID:"8af8906d-f36b-4a21-828c-b5c53165f945", ResourceVersion:"1798", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5588694d89", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228", Pod:"calico-kube-controllers-5588694d89-69h2v", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32fcfa959a8", MAC:"be:d6:74:a1:eb:b9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:19:38.547864 env[1477]: 2024-02-12 22:19:38.545 [INFO][5205] k8s.go 491: Wrote updated endpoint to datastore ContainerID="36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228" Namespace="calico-system" Pod="calico-kube-controllers-5588694d89-69h2v" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:19:38.554000 audit[5263]: NETFILTER_CFG table=filter:122 family=2 entries=38 op=nft_register_chain pid=5263 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:19:38.554000 audit[5263]: SYSCALL arch=c000003e syscall=46 success=yes exit=19492 a0=3 a1=7fff3f722760 a2=0 a3=7fff3f72274c items=0 ppid=4299 pid=5263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:38.554000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:19:38.565451 env[1477]: time="2024-02-12T22:19:38.565355780Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:19:38.565451 env[1477]: time="2024-02-12T22:19:38.565381372Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:19:38.565451 env[1477]: time="2024-02-12T22:19:38.565390587Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:19:38.565577 env[1477]: time="2024-02-12T22:19:38.565470540Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228 pid=5271 runtime=io.containerd.runc.v2 Feb 12 22:19:38.573768 systemd[1]: Started cri-containerd-36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228.scope. Feb 12 22:19:38.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit: BPF prog-id=172 op=LOAD Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5271 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:38.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626664363431396164666361613531616533316531383961363766 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5271 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:38.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626664363431396164666361613531616533316531383961363766 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit: BPF prog-id=173 op=LOAD Feb 12 22:19:38.579000 audit[5280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00009ebc0 items=0 ppid=5271 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:38.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626664363431396164666361613531616533316531383961363766 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit: BPF prog-id=174 op=LOAD Feb 12 22:19:38.579000 audit[5280]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00009ec08 items=0 ppid=5271 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:38.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626664363431396164666361613531616533316531383961363766 Feb 12 22:19:38.579000 audit: BPF prog-id=174 op=UNLOAD Feb 12 22:19:38.579000 audit: BPF prog-id=173 op=UNLOAD Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:19:38.579000 audit: BPF prog-id=175 op=LOAD Feb 12 22:19:38.579000 audit[5280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00009f018 items=0 ppid=5271 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:19:38.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626664363431396164666361613531616533316531383961363766 Feb 12 22:19:38.600733 env[1477]: time="2024-02-12T22:19:38.600701582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5588694d89-69h2v,Uid:8af8906d-f36b-4a21-828c-b5c53165f945,Namespace:calico-system,Attempt:1,} returns sandbox id \"36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228\"" Feb 12 22:19:38.898836 update_engine[1467]: I0212 22:19:38.898618 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 22:19:38.899865 update_engine[1467]: I0212 22:19:38.899070 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 22:19:38.899865 update_engine[1467]: E0212 22:19:38.899277 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 22:19:38.899865 update_engine[1467]: I0212 22:19:38.899462 1467 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 12 22:19:39.182221 systemd-networkd[1314]: calid5e2c3b7045: Gained IPv6LL Feb 12 22:19:39.822262 systemd-networkd[1314]: cali32fcfa959a8: Gained IPv6LL Feb 12 22:19:42.869101 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3369897468.mount: Deactivated successfully. Feb 12 22:19:48.906222 update_engine[1467]: I0212 22:19:48.906121 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 22:19:48.907065 update_engine[1467]: I0212 22:19:48.906612 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 22:19:48.907065 update_engine[1467]: E0212 22:19:48.906810 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 22:19:48.907065 update_engine[1467]: I0212 22:19:48.907013 1467 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 12 22:19:58.908317 update_engine[1467]: I0212 22:19:58.908198 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 22:19:58.909309 update_engine[1467]: I0212 22:19:58.908676 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 22:19:58.909309 update_engine[1467]: E0212 22:19:58.908876 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 22:19:58.909309 update_engine[1467]: I0212 22:19:58.909072 1467 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 12 22:19:58.909309 update_engine[1467]: I0212 22:19:58.909089 1467 omaha_request_action.cc:621] Omaha request response: Feb 12 22:19:58.909309 update_engine[1467]: E0212 22:19:58.909235 1467 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 12 22:19:58.909309 update_engine[1467]: I0212 22:19:58.909263 1467 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 12 22:19:58.909309 update_engine[1467]: I0212 22:19:58.909272 1467 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 12 22:19:58.909309 update_engine[1467]: I0212 22:19:58.909281 1467 update_attempter.cc:306] Processing Done. Feb 12 22:19:58.909309 update_engine[1467]: E0212 22:19:58.909305 1467 update_attempter.cc:619] Update failed. Feb 12 22:19:58.909309 update_engine[1467]: I0212 22:19:58.909315 1467 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 12 22:19:58.909309 update_engine[1467]: I0212 22:19:58.909325 1467 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.909336 1467 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.909523 1467 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.909577 1467 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.909586 1467 omaha_request_action.cc:271] Request: Feb 12 22:19:58.910495 update_engine[1467]: Feb 12 22:19:58.910495 update_engine[1467]: Feb 12 22:19:58.910495 update_engine[1467]: Feb 12 22:19:58.910495 update_engine[1467]: Feb 12 22:19:58.910495 update_engine[1467]: Feb 12 22:19:58.910495 update_engine[1467]: Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.909596 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.909880 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 22:19:58.910495 update_engine[1467]: E0212 22:19:58.910077 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.910210 1467 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.910224 1467 omaha_request_action.cc:621] Omaha request response: Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.910234 1467 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.910243 1467 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.910250 1467 update_attempter.cc:306] Processing Done. Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.910257 1467 update_attempter.cc:310] Error event sent. Feb 12 22:19:58.910495 update_engine[1467]: I0212 22:19:58.910279 1467 update_check_scheduler.cc:74] Next update check in 44m47s Feb 12 22:19:58.912329 locksmithd[1512]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 12 22:19:58.912329 locksmithd[1512]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 12 22:20:04.070000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.096864 kernel: kauditd_printk_skb: 356 callbacks suppressed Feb 12 22:20:04.096904 kernel: audit: type=1400 audit(1707776404.070:1467): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.070000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f74fa0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:20:04.299543 kernel: audit: type=1300 audit(1707776404.070:1467): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f74fa0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:20:04.299628 kernel: audit: type=1327 audit(1707776404.070:1467): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:20:04.070000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:20:04.070000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.474512 kernel: audit: type=1400 audit(1707776404.070:1468): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.474581 kernel: audit: type=1300 audit(1707776404.070:1468): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f84d80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:20:04.070000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f84d80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:20:04.588350 kernel: audit: type=1327 audit(1707776404.070:1468): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:20:04.070000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:20:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00102e840 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:20:04.900268 kernel: audit: type=1400 audit(1707776404.715:1469): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.900330 kernel: audit: type=1300 audit(1707776404.715:1469): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00102e840 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:20:04.900353 kernel: audit: type=1327 audit(1707776404.715:1469): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:20:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:20:04.991084 kernel: audit: type=1400 audit(1707776404.715:1470): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00c1c8120 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:20:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:20:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c002d330c0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:20:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:20:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00b681bc0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:20:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:20:04.717000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.717000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00a1c8570 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:20:04.717000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:20:04.717000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:04.717000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c009348510 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:20:04.717000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:20:07.456000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:07.456000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f20ba0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:20:07.456000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:20:07.457000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:07.457000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f20bc0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:20:07.457000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:20:07.459000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:07.459000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a2e6a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:20:07.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:20:07.466000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:20:07.466000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ac46e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:20:07.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:20:08.244965 env[1477]: time="2024-02-12T22:20:08.244836956Z" level=info msg="StopPodSandbox for \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\"" Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.275 [WARNING][5369] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0", GenerateName:"calico-kube-controllers-5588694d89-", Namespace:"calico-system", SelfLink:"", UID:"8af8906d-f36b-4a21-828c-b5c53165f945", ResourceVersion:"1801", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5588694d89", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228", Pod:"calico-kube-controllers-5588694d89-69h2v", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32fcfa959a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.275 [INFO][5369] k8s.go 578: Cleaning up netns ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.275 [INFO][5369] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" iface="eth0" netns="" Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.275 [INFO][5369] k8s.go 585: Releasing IP address(es) ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.275 [INFO][5369] utils.go 188: Calico CNI releasing IP address ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.285 [INFO][5382] ipam_plugin.go 415: Releasing address using handleID ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" HandleID="k8s-pod-network.8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.285 [INFO][5382] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.285 [INFO][5382] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.289 [WARNING][5382] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" HandleID="k8s-pod-network.8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.289 [INFO][5382] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" HandleID="k8s-pod-network.8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.290 [INFO][5382] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:20:08.291848 env[1477]: 2024-02-12 22:20:08.291 [INFO][5369] k8s.go 591: Teardown processing complete. ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:20:08.292240 env[1477]: time="2024-02-12T22:20:08.291864971Z" level=info msg="TearDown network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\" successfully" Feb 12 22:20:08.292240 env[1477]: time="2024-02-12T22:20:08.291886082Z" level=info msg="StopPodSandbox for \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\" returns successfully" Feb 12 22:20:08.292287 env[1477]: time="2024-02-12T22:20:08.292242590Z" level=info msg="RemovePodSandbox for \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\"" Feb 12 22:20:08.292287 env[1477]: time="2024-02-12T22:20:08.292261303Z" level=info msg="Forcibly stopping sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\"" Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.309 [WARNING][5409] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0", GenerateName:"calico-kube-controllers-5588694d89-", Namespace:"calico-system", SelfLink:"", UID:"8af8906d-f36b-4a21-828c-b5c53165f945", ResourceVersion:"1801", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5588694d89", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228", Pod:"calico-kube-controllers-5588694d89-69h2v", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32fcfa959a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.309 [INFO][5409] k8s.go 578: Cleaning up netns ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.309 [INFO][5409] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" iface="eth0" netns="" Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.309 [INFO][5409] k8s.go 585: Releasing IP address(es) ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.309 [INFO][5409] utils.go 188: Calico CNI releasing IP address ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.320 [INFO][5425] ipam_plugin.go 415: Releasing address using handleID ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" HandleID="k8s-pod-network.8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.320 [INFO][5425] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.320 [INFO][5425] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.324 [WARNING][5425] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" HandleID="k8s-pod-network.8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.324 [INFO][5425] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" HandleID="k8s-pod-network.8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--kube--controllers--5588694d89--69h2v-eth0" Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.325 [INFO][5425] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:20:08.327287 env[1477]: 2024-02-12 22:20:08.326 [INFO][5409] k8s.go 591: Teardown processing complete. ContainerID="8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd" Feb 12 22:20:08.327637 env[1477]: time="2024-02-12T22:20:08.327304940Z" level=info msg="TearDown network for sandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\" successfully" Feb 12 22:20:08.328692 env[1477]: time="2024-02-12T22:20:08.328639262Z" level=info msg="RemovePodSandbox \"8c1b4013e4617c644c5ea63443d93c23aff4ce296a9f6d140eed1c2bd6e59abd\" returns successfully" Feb 12 22:20:08.328995 env[1477]: time="2024-02-12T22:20:08.328914343Z" level=info msg="StopPodSandbox for \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\"" Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.348 [WARNING][5452] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"50c42a46-815d-42a9-933b-f2f227f8c5a7", ResourceVersion:"1776", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5", Pod:"coredns-787d4945fb-kh6pd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7d8dd00d53", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.348 [INFO][5452] k8s.go 578: Cleaning up netns ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.349 [INFO][5452] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" iface="eth0" netns="" Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.349 [INFO][5452] k8s.go 585: Releasing IP address(es) ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.349 [INFO][5452] utils.go 188: Calico CNI releasing IP address ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.360 [INFO][5465] ipam_plugin.go 415: Releasing address using handleID ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" HandleID="k8s-pod-network.8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.360 [INFO][5465] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.360 [INFO][5465] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.365 [WARNING][5465] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" HandleID="k8s-pod-network.8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.365 [INFO][5465] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" HandleID="k8s-pod-network.8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.366 [INFO][5465] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:20:08.368272 env[1477]: 2024-02-12 22:20:08.367 [INFO][5452] k8s.go 591: Teardown processing complete. ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:20:08.368272 env[1477]: time="2024-02-12T22:20:08.368258686Z" level=info msg="TearDown network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\" successfully" Feb 12 22:20:08.368742 env[1477]: time="2024-02-12T22:20:08.368281483Z" level=info msg="StopPodSandbox for \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\" returns successfully" Feb 12 22:20:08.368742 env[1477]: time="2024-02-12T22:20:08.368585573Z" level=info msg="RemovePodSandbox for \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\"" Feb 12 22:20:08.368742 env[1477]: time="2024-02-12T22:20:08.368608451Z" level=info msg="Forcibly stopping sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\"" Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.395 [WARNING][5493] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"50c42a46-815d-42a9-933b-f2f227f8c5a7", ResourceVersion:"1776", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"0d9b92dd08943620e24e593014237ada3eceb0fa0de41f575cb5099c16a0fcf5", Pod:"coredns-787d4945fb-kh6pd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7d8dd00d53", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.396 [INFO][5493] k8s.go 578: Cleaning up netns ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.396 [INFO][5493] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" iface="eth0" netns="" Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.396 [INFO][5493] k8s.go 585: Releasing IP address(es) ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.396 [INFO][5493] utils.go 188: Calico CNI releasing IP address ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.411 [INFO][5509] ipam_plugin.go 415: Releasing address using handleID ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" HandleID="k8s-pod-network.8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.412 [INFO][5509] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.412 [INFO][5509] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.418 [WARNING][5509] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" HandleID="k8s-pod-network.8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.418 [INFO][5509] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" HandleID="k8s-pod-network.8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--kh6pd-eth0" Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.419 [INFO][5509] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:20:08.421797 env[1477]: 2024-02-12 22:20:08.420 [INFO][5493] k8s.go 591: Teardown processing complete. ContainerID="8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467" Feb 12 22:20:08.422349 env[1477]: time="2024-02-12T22:20:08.421798743Z" level=info msg="TearDown network for sandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\" successfully" Feb 12 22:20:08.423742 env[1477]: time="2024-02-12T22:20:08.423693689Z" level=info msg="RemovePodSandbox \"8715d9256adc7e8fb681218e83f5972b89f4df9837e862fcdc830af3d1474467\" returns successfully" Feb 12 22:20:08.424153 env[1477]: time="2024-02-12T22:20:08.424101009Z" level=info msg="StopPodSandbox for \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\"" Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.454 [WARNING][5536] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"626b6a1d-cf78-40dc-b919-7e003fb6b49d", ResourceVersion:"1784", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8", Pod:"coredns-787d4945fb-mxz9p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid780c6e5bd1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.454 [INFO][5536] k8s.go 578: Cleaning up netns ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.454 [INFO][5536] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" iface="eth0" netns="" Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.454 [INFO][5536] k8s.go 585: Releasing IP address(es) ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.454 [INFO][5536] utils.go 188: Calico CNI releasing IP address ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.470 [INFO][5552] ipam_plugin.go 415: Releasing address using handleID ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" HandleID="k8s-pod-network.aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.470 [INFO][5552] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.470 [INFO][5552] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.477 [WARNING][5552] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" HandleID="k8s-pod-network.aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.477 [INFO][5552] ipam_plugin.go 443: Releasing address using workloadID ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" HandleID="k8s-pod-network.aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.478 [INFO][5552] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:20:08.480542 env[1477]: 2024-02-12 22:20:08.479 [INFO][5536] k8s.go 591: Teardown processing complete. ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:20:08.481100 env[1477]: time="2024-02-12T22:20:08.480558169Z" level=info msg="TearDown network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\" successfully" Feb 12 22:20:08.481100 env[1477]: time="2024-02-12T22:20:08.480588498Z" level=info msg="StopPodSandbox for \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\" returns successfully" Feb 12 22:20:08.481100 env[1477]: time="2024-02-12T22:20:08.480861026Z" level=info msg="RemovePodSandbox for \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\"" Feb 12 22:20:08.481100 env[1477]: time="2024-02-12T22:20:08.480888097Z" level=info msg="Forcibly stopping sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\"" Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.510 [WARNING][5579] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"626b6a1d-cf78-40dc-b919-7e003fb6b49d", ResourceVersion:"1784", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"61a2a9e07954dd52d171db10d0148fedb06791d2f6c4433f4c05415788a2f7a8", Pod:"coredns-787d4945fb-mxz9p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid780c6e5bd1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.510 [INFO][5579] k8s.go 578: Cleaning up netns ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.511 [INFO][5579] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" iface="eth0" netns="" Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.511 [INFO][5579] k8s.go 585: Releasing IP address(es) ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.511 [INFO][5579] utils.go 188: Calico CNI releasing IP address ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.526 [INFO][5594] ipam_plugin.go 415: Releasing address using handleID ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" HandleID="k8s-pod-network.aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.526 [INFO][5594] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.526 [INFO][5594] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.533 [WARNING][5594] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" HandleID="k8s-pod-network.aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.533 [INFO][5594] ipam_plugin.go 443: Releasing address using workloadID ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" HandleID="k8s-pod-network.aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Workload="ci--3510.3.2--a--0de130baf6-k8s-coredns--787d4945fb--mxz9p-eth0" Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.535 [INFO][5594] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:20:08.537191 env[1477]: 2024-02-12 22:20:08.536 [INFO][5579] k8s.go 591: Teardown processing complete. ContainerID="aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a" Feb 12 22:20:08.537191 env[1477]: time="2024-02-12T22:20:08.537171404Z" level=info msg="TearDown network for sandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\" successfully" Feb 12 22:20:08.539044 env[1477]: time="2024-02-12T22:20:08.539022607Z" level=info msg="RemovePodSandbox \"aa442e4734725d8d4d0475989bc2b7dec4b12972f41092c7cd8900c0c6bcad9a\" returns successfully" Feb 12 22:20:08.539412 env[1477]: time="2024-02-12T22:20:08.539381390Z" level=info msg="StopPodSandbox for \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\"" Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.569 [WARNING][5625] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d69383b0-7b9e-4b37-94b0-ee606e362b74", ResourceVersion:"1793", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3", Pod:"csi-node-driver-242vw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid5e2c3b7045", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.569 [INFO][5625] k8s.go 578: Cleaning up netns ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.569 [INFO][5625] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" iface="eth0" netns="" Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.569 [INFO][5625] k8s.go 585: Releasing IP address(es) ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.569 [INFO][5625] utils.go 188: Calico CNI releasing IP address ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.586 [INFO][5643] ipam_plugin.go 415: Releasing address using handleID ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" HandleID="k8s-pod-network.9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.586 [INFO][5643] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.586 [INFO][5643] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.592 [WARNING][5643] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" HandleID="k8s-pod-network.9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.592 [INFO][5643] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" HandleID="k8s-pod-network.9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.594 [INFO][5643] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:20:08.596200 env[1477]: 2024-02-12 22:20:08.595 [INFO][5625] k8s.go 591: Teardown processing complete. ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:20:08.596982 env[1477]: time="2024-02-12T22:20:08.596199154Z" level=info msg="TearDown network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\" successfully" Feb 12 22:20:08.596982 env[1477]: time="2024-02-12T22:20:08.596233248Z" level=info msg="StopPodSandbox for \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\" returns successfully" Feb 12 22:20:08.596982 env[1477]: time="2024-02-12T22:20:08.596617200Z" level=info msg="RemovePodSandbox for \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\"" Feb 12 22:20:08.596982 env[1477]: time="2024-02-12T22:20:08.596653433Z" level=info msg="Forcibly stopping sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\"" Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.629 [WARNING][5671] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d69383b0-7b9e-4b37-94b0-ee606e362b74", ResourceVersion:"1793", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 9, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3", Pod:"csi-node-driver-242vw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid5e2c3b7045", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.629 [INFO][5671] k8s.go 578: Cleaning up netns ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.629 [INFO][5671] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" iface="eth0" netns="" Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.629 [INFO][5671] k8s.go 585: Releasing IP address(es) ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.629 [INFO][5671] utils.go 188: Calico CNI releasing IP address ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.647 [INFO][5689] ipam_plugin.go 415: Releasing address using handleID ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" HandleID="k8s-pod-network.9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.647 [INFO][5689] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.647 [INFO][5689] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.654 [WARNING][5689] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" HandleID="k8s-pod-network.9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.654 [INFO][5689] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" HandleID="k8s-pod-network.9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Workload="ci--3510.3.2--a--0de130baf6-k8s-csi--node--driver--242vw-eth0" Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.656 [INFO][5689] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:20:08.658266 env[1477]: 2024-02-12 22:20:08.657 [INFO][5671] k8s.go 591: Teardown processing complete. ContainerID="9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1" Feb 12 22:20:08.659043 env[1477]: time="2024-02-12T22:20:08.658339103Z" level=info msg="TearDown network for sandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\" successfully" Feb 12 22:20:08.661394 env[1477]: time="2024-02-12T22:20:08.661358464Z" level=info msg="RemovePodSandbox \"9d981057bb805f010340d9a5905d7ffa30da77cf301cf93bdb8ed7e91c9687d1\" returns successfully" Feb 12 22:20:22.124075 systemd[1]: Started sshd@20-147.75.49.97:22-121.146.142.226:36357.service. Feb 12 22:20:22.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.49.97:22-121.146.142.226:36357 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:20:22.149777 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:20:22.149823 kernel: audit: type=1130 audit(1707776422.123:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.49.97:22-121.146.142.226:36357 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:20:23.324700 sshd[5734]: Invalid user super from 121.146.142.226 port 36357 Feb 12 22:20:23.330776 sshd[5734]: pam_faillock(sshd:auth): User unknown Feb 12 22:20:23.331862 sshd[5734]: pam_unix(sshd:auth): check pass; user unknown Feb 12 22:20:23.331974 sshd[5734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.146.142.226 Feb 12 22:20:23.332857 sshd[5734]: pam_faillock(sshd:auth): User unknown Feb 12 22:20:23.332000 audit[5734]: USER_AUTH pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="super" exe="/usr/sbin/sshd" hostname=121.146.142.226 addr=121.146.142.226 terminal=ssh res=failed' Feb 12 22:20:23.427929 kernel: audit: type=1100 audit(1707776423.332:1480): pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="super" exe="/usr/sbin/sshd" hostname=121.146.142.226 addr=121.146.142.226 terminal=ssh res=failed' Feb 12 22:20:25.429235 sshd[5734]: Failed password for invalid user super from 121.146.142.226 port 36357 ssh2 Feb 12 22:20:27.097751 sshd[5734]: pam_faillock(sshd:auth): User unknown Feb 12 22:20:27.098760 sshd[5734]: pam_unix(sshd:auth): check pass; user unknown Feb 12 22:20:27.099747 sshd[5734]: pam_faillock(sshd:auth): User unknown Feb 12 22:20:27.098000 audit[5734]: USER_AUTH pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="super" exe="/usr/sbin/sshd" hostname=121.146.142.226 addr=121.146.142.226 terminal=ssh res=failed' Feb 12 22:20:27.193065 kernel: audit: type=1100 audit(1707776427.098:1481): pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="super" exe="/usr/sbin/sshd" hostname=121.146.142.226 addr=121.146.142.226 terminal=ssh res=failed' Feb 12 22:20:29.080643 sshd[5734]: Failed password for invalid user super from 121.146.142.226 port 36357 ssh2 Feb 12 22:20:31.125530 sshd[5734]: pam_faillock(sshd:auth): User unknown Feb 12 22:20:31.126692 sshd[5734]: pam_unix(sshd:auth): check pass; user unknown Feb 12 22:20:31.127860 sshd[5734]: pam_faillock(sshd:auth): User unknown Feb 12 22:20:31.127000 audit[5734]: USER_AUTH pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="super" exe="/usr/sbin/sshd" hostname=121.146.142.226 addr=121.146.142.226 terminal=ssh res=failed' Feb 12 22:20:31.221997 kernel: audit: type=1100 audit(1707776431.127:1482): pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="super" exe="/usr/sbin/sshd" hostname=121.146.142.226 addr=121.146.142.226 terminal=ssh res=failed' Feb 12 22:20:33.324292 sshd[5734]: Failed password for invalid user super from 121.146.142.226 port 36357 ssh2 Feb 12 22:20:35.957037 sshd[5734]: pam_faillock(sshd:auth): User unknown Feb 12 22:20:35.957545 sshd[5734]: pam_unix(sshd:auth): check pass; user unknown Feb 12 22:20:35.957813 sshd[5734]: pam_faillock(sshd:auth): User unknown Feb 12 22:20:35.956000 audit[5734]: USER_AUTH pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="super" exe="/usr/sbin/sshd" hostname=121.146.142.226 addr=121.146.142.226 terminal=ssh res=failed' Feb 12 22:20:36.051130 kernel: audit: type=1100 audit(1707776435.956:1483): pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="super" exe="/usr/sbin/sshd" hostname=121.146.142.226 addr=121.146.142.226 terminal=ssh res=failed' Feb 12 22:20:37.702209 sshd[5734]: Failed password for invalid user super from 121.146.142.226 port 36357 ssh2 Feb 12 22:21:04.070000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.070000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00227a8d0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:21:04.284326 kernel: audit: type=1400 audit(1707776464.070:1484): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.284374 kernel: audit: type=1300 audit(1707776464.070:1484): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00227a8d0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:21:04.284391 kernel: audit: type=1327 audit(1707776464.070:1484): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:21:04.070000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:21:04.071000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.378975 kernel: audit: type=1400 audit(1707776464.071:1485): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.071000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e41e20 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:21:04.589551 kernel: audit: type=1300 audit(1707776464.071:1485): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e41e20 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:21:04.589593 kernel: audit: type=1327 audit(1707776464.071:1485): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:21:04.071000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:21:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.808971 kernel: audit: type=1400 audit(1707776464.715:1487): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.809004 kernel: audit: type=1400 audit(1707776464.715:1486): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c002f99b20 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:21:04.999093 kernel: audit: type=1300 audit(1707776464.715:1486): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c002f99b20 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:21:04.999140 kernel: audit: type=1300 audit(1707776464.715:1487): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00428ade0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:21:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00428ade0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:21:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:21:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:21:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00b051050 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:21:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:21:04.715000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.715000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0129a1c60 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:21:04.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:21:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00428b440 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:21:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:21:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00b051080 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:21:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:21:07.456000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:07.456000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089a0c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:21:07.456000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:21:07.458000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:07.458000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089a0e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:21:07.458000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:21:07.459000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:07.459000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00089a100 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:21:07.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:21:07.467000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:21:07.467000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000809c80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:21:07.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:22:04.072000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.101370 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:22:04.101505 kernel: audit: type=1400 audit(1707776524.072:1496): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.072000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.287059 kernel: audit: type=1400 audit(1707776524.072:1497): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.287096 kernel: audit: type=1300 audit(1707776524.072:1497): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ba4fc0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:22:04.072000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ba4fc0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:22:04.408871 kernel: audit: type=1300 audit(1707776524.072:1496): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0011b9960 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:22:04.072000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0011b9960 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:22:04.530572 kernel: audit: type=1327 audit(1707776524.072:1497): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:22:04.072000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:22:04.624946 kernel: audit: type=1327 audit(1707776524.072:1496): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:22:04.072000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:22:04.716000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.811005 kernel: audit: type=1400 audit(1707776524.716:1498): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.811058 kernel: audit: type=1400 audit(1707776524.716:1499): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.716000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.716000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.993472 kernel: audit: type=1400 audit(1707776524.716:1500): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.716000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c002d3f340 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:22:05.092648 kernel: audit: type=1300 audit(1707776524.716:1499): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c002d3f340 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:22:04.716000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00a9e2a50 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:22:04.716000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00a525ef0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:22:04.716000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:22:04.716000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:22:04.716000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:22:04.716000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.716000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0031a8020 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:22:04.716000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:22:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c003d88e40 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:22:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:22:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00a525f20 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:22:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:22:07.457000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:07.457000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001778960 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:22:07.457000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:22:07.458000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:07.458000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001901660 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:22:07.458000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:22:07.460000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:07.460000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001901680 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:22:07.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:22:07.467000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:22:07.467000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006b2fe0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:22:07.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:22:21.957704 sshd[5734]: Timeout before authentication for 121.146.142.226 port 36357 Feb 12 22:22:21.958239 systemd[1]: sshd@20-147.75.49.97:22-121.146.142.226:36357.service: Deactivated successfully. Feb 12 22:22:21.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.49.97:22-121.146.142.226:36357 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:21.986212 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:22:21.986272 kernel: audit: type=1131 audit(1707776541.957:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.49.97:22-121.146.142.226:36357 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:29.785099 env[1477]: time="2024-02-12T22:22:29.785041385Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:29.785614 env[1477]: time="2024-02-12T22:22:29.785573099Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:29.786399 env[1477]: time="2024-02-12T22:22:29.786356973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:29.787433 env[1477]: time="2024-02-12T22:22:29.787394681Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:29.787633 env[1477]: time="2024-02-12T22:22:29.787588216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 22:22:29.787920 env[1477]: time="2024-02-12T22:22:29.787908082Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 22:22:29.788451 env[1477]: time="2024-02-12T22:22:29.788438654Z" level=info msg="CreateContainer within sandbox \"810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 22:22:29.793196 env[1477]: time="2024-02-12T22:22:29.793151766Z" level=info msg="CreateContainer within sandbox \"810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"fc91a7ffea64c3e5a8cab84da5a4ebdcbd4dfdb331fa72cdcce5856fe88b7beb\"" Feb 12 22:22:29.793379 env[1477]: time="2024-02-12T22:22:29.793354449Z" level=info msg="StartContainer for \"fc91a7ffea64c3e5a8cab84da5a4ebdcbd4dfdb331fa72cdcce5856fe88b7beb\"" Feb 12 22:22:29.803809 systemd[1]: Started cri-containerd-fc91a7ffea64c3e5a8cab84da5a4ebdcbd4dfdb331fa72cdcce5856fe88b7beb.scope. Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f870dc23968 items=0 ppid=5121 pid=5912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:29.972667 kernel: audit: type=1400 audit(1707776549.809:1509): avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.972705 kernel: audit: type=1300 audit(1707776549.809:1509): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f870dc23968 items=0 ppid=5121 pid=5912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:29.972724 kernel: audit: type=1327 audit(1707776549.809:1509): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393161376666656136346333653561386361623834646135613465 Feb 12 22:22:29.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393161376666656136346333653561386361623834646135613465 Feb 12 22:22:30.066671 kernel: audit: type=1400 audit(1707776549.809:1510): avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.130631 kernel: audit: type=1400 audit(1707776549.809:1510): avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.194928 kernel: audit: type=1400 audit(1707776549.809:1510): avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.323327 kernel: audit: type=1400 audit(1707776549.809:1510): avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.323365 kernel: audit: type=1400 audit(1707776549.809:1510): avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.328338 env[1477]: time="2024-02-12T22:22:30.328316001Z" level=info msg="StartContainer for \"fc91a7ffea64c3e5a8cab84da5a4ebdcbd4dfdb331fa72cdcce5856fe88b7beb\" returns successfully" Feb 12 22:22:30.388001 kernel: audit: type=1400 audit(1707776549.809:1510): avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.452562 kernel: audit: type=1400 audit(1707776549.809:1510): avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.809000 audit: BPF prog-id=176 op=LOAD Feb 12 22:22:29.809000 audit[5912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003b85a8 items=0 ppid=5121 pid=5912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:29.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393161376666656136346333653561386361623834646135613465 Feb 12 22:22:29.971000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.971000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.971000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.971000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.971000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.971000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.971000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.971000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.971000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:29.971000 audit: BPF prog-id=177 op=LOAD Feb 12 22:22:29.971000 audit[5912]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003b85f8 items=0 ppid=5121 pid=5912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:29.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393161376666656136346333653561386361623834646135613465 Feb 12 22:22:30.129000 audit: BPF prog-id=177 op=UNLOAD Feb 12 22:22:30.129000 audit: BPF prog-id=176 op=UNLOAD Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000197c30 a2=78 a3=c0003b8688 items=0 ppid=5121 pid=5912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:30.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393161376666656136346333653561386361623834646135613465 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { perfmon } for pid=5912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit[5912]: AVC avc: denied { bpf } for pid=5912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:30.129000 audit: BPF prog-id=178 op=LOAD Feb 12 22:22:30.129000 audit[5912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003b8688 items=0 ppid=5121 pid=5912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:30.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393161376666656136346333653561386361623834646135613465 Feb 12 22:23:04.073000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.101542 kernel: kauditd_printk_skb: 44 callbacks suppressed Feb 12 22:23:04.101614 kernel: audit: type=1400 audit(1707776584.073:1516): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.073000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b17d70 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:23:04.193975 kernel: audit: type=1300 audit(1707776584.073:1516): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b17d70 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:23:04.073000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:04.408875 kernel: audit: type=1327 audit(1707776584.073:1516): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:04.408965 kernel: audit: type=1400 audit(1707776584.073:1517): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.073000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.073000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001f74580 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:23:04.073000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:04.715576 kernel: audit: type=1300 audit(1707776584.073:1517): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001f74580 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:23:04.715617 kernel: audit: type=1327 audit(1707776584.073:1517): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:04.717000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.717000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002eb2d40 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:23:04.908435 kernel: audit: type=1400 audit(1707776584.717:1518): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.908476 kernel: audit: type=1300 audit(1707776584.717:1518): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002eb2d40 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:23:04.908493 kernel: audit: type=1327 audit(1707776584.717:1518): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:23:04.717000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:23:05.002607 kernel: audit: type=1400 audit(1707776584.717:1519): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.717000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.717000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01084b080 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:23:04.717000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.717000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:23:04.717000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00e2d59e0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:23:04.717000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:23:04.717000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.717000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002eb2d60 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:23:04.717000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:23:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0082fc000 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:23:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:23:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0091d4780 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:23:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:23:07.457000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:07.457000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f21e80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:23:07.457000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:07.459000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:07.459000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d11ee0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:23:07.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:07.461000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:07.461000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f21fa0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:23:07.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:07.468000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:07.468000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0000860c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:23:07.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:08.335751 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 12 22:23:08.342150 systemd-tmpfiles[5987]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 22:23:08.342377 systemd-tmpfiles[5987]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 22:23:08.343104 systemd-tmpfiles[5987]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 22:23:08.360901 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 12 22:23:08.361375 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 12 22:23:08.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:08.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:08.369543 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 12 22:24:04.074000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.110078 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 12 22:24:04.110166 kernel: audit: type=1400 audit(1707776644.074:1530): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.074000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f757c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:24:04.320871 kernel: audit: type=1300 audit(1707776644.074:1530): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f757c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:24:04.320917 kernel: audit: type=1327 audit(1707776644.074:1530): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:04.074000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:04.074000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.505067 kernel: audit: type=1400 audit(1707776644.074:1531): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.505127 kernel: audit: type=1300 audit(1707776644.074:1531): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0018f79b0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:24:04.074000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0018f79b0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:24:04.625548 kernel: audit: type=1327 audit(1707776644.074:1531): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:04.074000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00e2d5200 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:24:04.908892 kernel: audit: type=1400 audit(1707776644.718:1532): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.908952 kernel: audit: type=1300 audit(1707776644.718:1532): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00e2d5200 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:24:04.908969 kernel: audit: type=1327 audit(1707776644.718:1532): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:24:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:24:05.002244 kernel: audit: type=1400 audit(1707776644.718:1533): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c01074e450 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:24:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:24:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c012969980 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:24:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:24:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0129699a0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:24:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:24:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00c08af90 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:24:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:24:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00c08aff0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:24:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:24:07.458000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:07.458000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00104db80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:24:07.458000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:07.460000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:07.460000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002daa2a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:24:07.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:07.461000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:07.461000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f75b20 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:24:07.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:07.470000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:07.470000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002daa3c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:24:07.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:04.074000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.102840 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:25:04.102907 kernel: audit: type=1400 audit(1707776704.074:1542): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.074000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b9880 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:25:04.315429 kernel: audit: type=1300 audit(1707776704.074:1542): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b9880 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:25:04.315475 kernel: audit: type=1327 audit(1707776704.074:1542): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:04.074000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:04.074000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.498337 kernel: audit: type=1400 audit(1707776704.074:1543): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.498382 kernel: audit: type=1300 audit(1707776704.074:1543): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000b16570 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:25:04.074000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000b16570 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:25:04.074000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:04.711868 kernel: audit: type=1327 audit(1707776704.074:1543): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01313dc50 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:25:04.908394 kernel: audit: type=1400 audit(1707776704.718:1544): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.908474 kernel: audit: type=1300 audit(1707776704.718:1544): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01313dc50 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:25:04.908492 kernel: audit: type=1327 audit(1707776704.718:1544): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:25:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:25:05.001812 kernel: audit: type=1400 audit(1707776704.718:1545): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ae819e0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:25:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:25:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00b9f9c40 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:25:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:25:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c000f18fa0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:25:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:25:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01313dd70 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:25:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:25:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01313dda0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:25:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:25:07.460000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:07.460000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f20900 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:25:07.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:07.461000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:07.461000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f20920 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:25:07.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:07.462000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:07.462000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025cb5a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:25:07.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:07.471000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:07.471000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b99a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:25:07.471000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:04.075000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.112207 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:26:04.112304 kernel: audit: type=1400 audit(1707776764.075:1555): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.075000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.293675 kernel: audit: type=1400 audit(1707776764.075:1554): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.293744 kernel: audit: type=1300 audit(1707776764.075:1554): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00264f6e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:26:04.075000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00264f6e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:26:04.075000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001f75180 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:26:04.532816 kernel: audit: type=1300 audit(1707776764.075:1555): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001f75180 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:26:04.532853 kernel: audit: type=1327 audit(1707776764.075:1554): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:04.075000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:04.626410 kernel: audit: type=1327 audit(1707776764.075:1555): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:04.075000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.809602 kernel: audit: type=1400 audit(1707776764.718:1556): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.809639 kernel: audit: type=1300 audit(1707776764.718:1556): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c000354aa0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:26:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c000354aa0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:26:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:26:05.001302 kernel: audit: type=1327 audit(1707776764.718:1556): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:26:05.001373 kernel: audit: type=1400 audit(1707776764.718:1557): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00bafe540 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:26:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:26:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00b1e9f50 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:26:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:26:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01251e120 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:26:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:26:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c01251e150 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:26:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:26:04.718000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:04.718000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c010339770 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:26:04.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:26:07.461000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:07.461000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f21480 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:26:07.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:07.462000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:07.462000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f214a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:26:07.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:07.463000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:07.463000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c46700 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:26:07.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:07.472000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:07.472000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f215c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:26:07.472000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:27:04.076000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.120744 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:27:04.120868 kernel: audit: type=1400 audit(1707776824.076:1566): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.076000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c41200 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:27:04.333094 kernel: audit: type=1300 audit(1707776824.076:1566): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c41200 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:27:04.333120 kernel: audit: type=1327 audit(1707776824.076:1566): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:27:04.076000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:27:04.425433 kernel: audit: type=1400 audit(1707776824.076:1567): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.076000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.076000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018ae7e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:27:04.635005 kernel: audit: type=1300 audit(1707776824.076:1567): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018ae7e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:27:04.635059 kernel: audit: type=1327 audit(1707776824.076:1567): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:27:04.076000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:27:04.719000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.818311 kernel: audit: type=1400 audit(1707776824.719:1569): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.818381 kernel: audit: type=1400 audit(1707776824.719:1568): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.719000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.909332 kernel: audit: type=1300 audit(1707776824.719:1568): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00d6f8900 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:27:04.719000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00d6f8900 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:27:05.007395 kernel: audit: type=1300 audit(1707776824.719:1569): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c002f6fd00 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:27:04.719000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c002f6fd00 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:27:04.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:27:04.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:27:04.719000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.719000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01312cd80 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:27:04.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:27:04.719000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.719000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00ba161e0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:27:04.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:27:04.719000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.719000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c012fc8990 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:27:04.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:27:04.719000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:04.719000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01312cde0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:27:04.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:27:07.461000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:07.461000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015228a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:27:07.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:27:07.462000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:07.462000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015228c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:27:07.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:27:07.464000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:07.464000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018aed80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:27:07.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:27:07.472000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:27:07.472000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ac5920 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:27:07.472000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:28:04.077000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.122451 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:28:04.122552 kernel: audit: type=1400 audit(1707776884.077:1578): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.077000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0021e77c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:28:04.214934 kernel: audit: type=1300 audit(1707776884.077:1578): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0021e77c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:28:04.077000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:28:04.428576 kernel: audit: type=1327 audit(1707776884.077:1578): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:28:04.428616 kernel: audit: type=1400 audit(1707776884.077:1579): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.077000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.519942 kernel: audit: type=1300 audit(1707776884.077:1579): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0024b8c00 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:28:04.077000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0024b8c00 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:28:04.641474 kernel: audit: type=1327 audit(1707776884.077:1579): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:28:04.077000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:28:04.720000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.827982 kernel: audit: type=1400 audit(1707776884.720:1580): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.828061 kernel: audit: type=1300 audit(1707776884.720:1580): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013b9db90 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:28:04.720000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013b9db90 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:28:04.720000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:28:05.021475 kernel: audit: type=1327 audit(1707776884.720:1580): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:28:05.021563 kernel: audit: type=1400 audit(1707776884.720:1581): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.720000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.720000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013b9dbc0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:28:04.720000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:28:04.720000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.720000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c001dc8d00 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:28:04.720000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:28:04.720000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.720000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013b9dc50 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:28:04.720000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:28:04.720000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.720000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:04.720000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002f1f560 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:28:04.720000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:28:04.720000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00116def0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:28:04.720000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:28:07.461000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:07.461000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024124a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:28:07.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:28:07.463000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:07.463000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0021e7a40 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:28:07.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:28:07.464000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:07.464000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d10e40 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:28:07.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:28:07.472000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:28:07.472000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0021e7b60 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:28:07.472000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:28:33.407462 systemd[1]: Started sshd@21-147.75.49.97:22-121.224.115.232:52381.service. Feb 12 22:28:33.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.49.97:22-121.224.115.232:52381 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:28:33.445212 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:28:33.445282 kernel: audit: type=1130 audit(1707776913.406:1590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.49.97:22-121.224.115.232:52381 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:28:35.010205 sshd[6402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.224.115.232 user=root Feb 12 22:28:35.009000 audit[6402]: USER_AUTH pid=6402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.224.115.232 addr=121.224.115.232 terminal=ssh res=failed' Feb 12 22:28:35.102993 kernel: audit: type=1100 audit(1707776915.009:1591): pid=6402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.224.115.232 addr=121.224.115.232 terminal=ssh res=failed' Feb 12 22:28:37.316043 sshd[6402]: Failed password for root from 121.224.115.232 port 52381 ssh2 Feb 12 22:28:38.966649 sshd[6402]: Received disconnect from 121.224.115.232 port 52381:11: Bye Bye [preauth] Feb 12 22:28:38.966649 sshd[6402]: Disconnected from authenticating user root 121.224.115.232 port 52381 [preauth] Feb 12 22:28:38.967292 systemd[1]: sshd@21-147.75.49.97:22-121.224.115.232:52381.service: Deactivated successfully. Feb 12 22:28:38.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.49.97:22-121.224.115.232:52381 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:28:39.060146 kernel: audit: type=1131 audit(1707776918.966:1592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.49.97:22-121.224.115.232:52381 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:28:54.823356 systemd[1]: Started sshd@22-147.75.49.97:22-130.162.42.103:38468.service. Feb 12 22:28:54.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.97:22-130.162.42.103:38468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:28:54.914927 kernel: audit: type=1130 audit(1707776934.822:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.97:22-130.162.42.103:38468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:28:55.654891 sshd[6440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.42.103 user=root Feb 12 22:28:55.654000 audit[6440]: USER_AUTH pid=6440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=130.162.42.103 addr=130.162.42.103 terminal=ssh res=failed' Feb 12 22:28:55.747133 kernel: audit: type=1100 audit(1707776935.654:1594): pid=6440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=130.162.42.103 addr=130.162.42.103 terminal=ssh res=failed' Feb 12 22:28:58.042125 sshd[6440]: Failed password for root from 130.162.42.103 port 38468 ssh2 Feb 12 22:28:59.596682 sshd[6440]: Received disconnect from 130.162.42.103 port 38468:11: Bye Bye [preauth] Feb 12 22:28:59.596682 sshd[6440]: Disconnected from authenticating user root 130.162.42.103 port 38468 [preauth] Feb 12 22:28:59.599287 systemd[1]: sshd@22-147.75.49.97:22-130.162.42.103:38468.service: Deactivated successfully. Feb 12 22:28:59.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.97:22-130.162.42.103:38468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:28:59.692129 kernel: audit: type=1131 audit(1707776939.598:1595): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.97:22-130.162.42.103:38468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:29:04.077000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.077000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c40090 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:29:04.172025 kernel: audit: type=1400 audit(1707776944.077:1596): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.172076 kernel: audit: type=1300 audit(1707776944.077:1596): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c40090 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:29:04.077000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:29:04.385931 kernel: audit: type=1327 audit(1707776944.077:1596): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:29:04.386013 kernel: audit: type=1400 audit(1707776944.077:1597): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.077000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.476309 kernel: audit: type=1300 audit(1707776944.077:1597): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001252b80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:29:04.077000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001252b80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:29:04.077000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:29:04.597995 kernel: audit: type=1327 audit(1707776944.077:1597): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:29:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002f1e240 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:29:04.813005 kernel: audit: type=1400 audit(1707776944.721:1598): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.813037 kernel: audit: type=1300 audit(1707776944.721:1598): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002f1e240 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:29:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:29:05.007079 kernel: audit: type=1327 audit(1707776944.721:1598): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:29:05.007155 kernel: audit: type=1400 audit(1707776944.721:1599): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c013b9cf00 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:29:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:29:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ba09f60 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:29:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:29:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a2f0270 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:29:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:29:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00d038cf0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:29:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:29:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c013b9cf60 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:29:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:29:07.462000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:07.462000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002dab4c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:29:07.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:29:07.463000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:07.463000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00111cd20 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:29:07.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:29:07.464000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:07.464000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002dab5e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:29:07.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:29:07.474000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:29:07.474000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00111cea0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:29:07.474000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:30:04.078000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.107436 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:30:04.107517 kernel: audit: type=1400 audit(1707777004.078:1608): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.078000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f85230 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:30:04.322738 kernel: audit: type=1300 audit(1707777004.078:1608): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f85230 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:30:04.322830 kernel: audit: type=1327 audit(1707777004.078:1608): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:30:04.078000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:30:04.078000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.506305 kernel: audit: type=1400 audit(1707777004.078:1609): avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.506378 kernel: audit: type=1300 audit(1707777004.078:1609): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001778f20 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:30:04.078000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001778f20 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:30:04.626672 kernel: audit: type=1327 audit(1707777004.078:1609): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:30:04.078000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:30:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c012993320 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:30:04.812939 kernel: audit: type=1400 audit(1707777004.721:1610): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.812987 kernel: audit: type=1300 audit(1707777004.721:1610): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c012993320 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:30:04.816391 systemd[1]: Started sshd@23-147.75.49.97:22-139.178.68.195:52578.service. Feb 12 22:30:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:30:04.935650 sshd[6531]: Accepted publickey for core from 139.178.68.195 port 52578 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:04.936626 sshd[6531]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:04.939404 systemd-logind[1464]: New session 10 of user core. Feb 12 22:30:04.939871 systemd[1]: Started session-10.scope. Feb 12 22:30:05.004139 kernel: audit: type=1327 audit(1707777004.721:1610): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:30:05.004227 kernel: audit: type=1400 audit(1707777004.721:1611): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:05.025249 sshd[6531]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:05.026629 systemd[1]: sshd@23-147.75.49.97:22-139.178.68.195:52578.service: Deactivated successfully. Feb 12 22:30:05.027071 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 22:30:05.027463 systemd-logind[1464]: Session 10 logged out. Waiting for processes to exit. Feb 12 22:30:05.027855 systemd-logind[1464]: Removed session 10. Feb 12 22:30:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00a2f1b60 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:30:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:30:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00a2f1bf0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:30:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:30:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00b39bc20 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:30:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:30:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00bcaf5c0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:30:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:30:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c014122000 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:30:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:30:04.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.49.97:22-139.178.68.195:52578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:04.934000 audit[6531]: USER_ACCT pid=6531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:04.935000 audit[6531]: CRED_ACQ pid=6531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:04.935000 audit[6531]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4a174b00 a2=3 a3=0 items=0 ppid=1 pid=6531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:04.935000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:04.941000 audit[6531]: USER_START pid=6531 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:04.941000 audit[6534]: CRED_ACQ pid=6534 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:05.025000 audit[6531]: USER_END pid=6531 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:05.025000 audit[6531]: CRED_DISP pid=6531 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:05.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.49.97:22-139.178.68.195:52578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:07.463000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:07.463000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d105a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:30:07.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:30:07.464000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:07.464000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001523d40 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:30:07.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:30:07.465000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:07.465000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d107c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:30:07.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:30:07.475000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:30:07.475000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001523e60 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:30:07.475000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:30:10.034565 systemd[1]: Started sshd@24-147.75.49.97:22-139.178.68.195:44284.service. Feb 12 22:30:10.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.49.97:22-139.178.68.195:44284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:10.061879 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 12 22:30:10.061917 kernel: audit: type=1130 audit(1707777010.033:1629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.49.97:22-139.178.68.195:44284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:10.091204 systemd[1]: Started sshd@25-147.75.49.97:22-121.15.140.235:4251.service. Feb 12 22:30:10.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.49.97:22-121.15.140.235:4251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:10.177125 sshd[6570]: Accepted publickey for core from 139.178.68.195 port 44284 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:10.178460 sshd[6570]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:10.181137 systemd-logind[1464]: New session 11 of user core. Feb 12 22:30:10.181801 systemd[1]: Started session-11.scope. Feb 12 22:30:10.240825 kernel: audit: type=1130 audit(1707777010.090:1630): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.49.97:22-121.15.140.235:4251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:10.240933 kernel: audit: type=1101 audit(1707777010.176:1631): pid=6570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.176000 audit[6570]: USER_ACCT pid=6570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.262234 sshd[6570]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:10.263548 systemd[1]: sshd@24-147.75.49.97:22-139.178.68.195:44284.service: Deactivated successfully. Feb 12 22:30:10.263995 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 22:30:10.264413 systemd-logind[1464]: Session 11 logged out. Waiting for processes to exit. Feb 12 22:30:10.264889 systemd-logind[1464]: Removed session 11. Feb 12 22:30:10.177000 audit[6570]: CRED_ACQ pid=6570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.423401 kernel: audit: type=1103 audit(1707777010.177:1632): pid=6570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.482311 kernel: audit: type=1006 audit(1707777010.177:1633): pid=6570 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 22:30:10.482413 kernel: audit: type=1300 audit(1707777010.177:1633): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4d079f20 a2=3 a3=0 items=0 ppid=1 pid=6570 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:10.177000 audit[6570]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4d079f20 a2=3 a3=0 items=0 ppid=1 pid=6570 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:10.177000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:10.606170 kernel: audit: type=1327 audit(1707777010.177:1633): proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:10.606227 kernel: audit: type=1105 audit(1707777010.183:1634): pid=6570 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.183000 audit[6570]: USER_START pid=6570 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.183000 audit[6575]: CRED_ACQ pid=6575 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.791158 kernel: audit: type=1103 audit(1707777010.183:1635): pid=6575 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.791212 kernel: audit: type=1106 audit(1707777010.261:1636): pid=6570 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.261000 audit[6570]: USER_END pid=6570 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.261000 audit[6570]: CRED_DISP pid=6570 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:10.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.49.97:22-139.178.68.195:44284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:11.136628 sshd[6573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.140.235 user=root Feb 12 22:30:11.136000 audit[6573]: USER_AUTH pid=6573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.15.140.235 addr=121.15.140.235 terminal=ssh res=failed' Feb 12 22:30:12.956112 sshd[6573]: Failed password for root from 121.15.140.235 port 4251 ssh2 Feb 12 22:30:13.202593 sshd[6573]: Received disconnect from 121.15.140.235 port 4251:11: Bye Bye [preauth] Feb 12 22:30:13.202593 sshd[6573]: Disconnected from authenticating user root 121.15.140.235 port 4251 [preauth] Feb 12 22:30:13.205112 systemd[1]: sshd@25-147.75.49.97:22-121.15.140.235:4251.service: Deactivated successfully. Feb 12 22:30:13.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.49.97:22-121.15.140.235:4251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:15.272375 systemd[1]: Started sshd@26-147.75.49.97:22-139.178.68.195:44288.service. Feb 12 22:30:15.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.49.97:22-139.178.68.195:44288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:15.299653 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 22:30:15.299759 kernel: audit: type=1130 audit(1707777015.271:1641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.49.97:22-139.178.68.195:44288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:15.414000 audit[6601]: USER_ACCT pid=6601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:15.415797 sshd[6601]: Accepted publickey for core from 139.178.68.195 port 44288 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:15.422219 sshd[6601]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:15.424487 systemd-logind[1464]: New session 12 of user core. Feb 12 22:30:15.425104 systemd[1]: Started session-12.scope. Feb 12 22:30:15.503599 sshd[6601]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:15.504865 systemd[1]: sshd@26-147.75.49.97:22-139.178.68.195:44288.service: Deactivated successfully. Feb 12 22:30:15.505298 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 22:30:15.505642 systemd-logind[1464]: Session 12 logged out. Waiting for processes to exit. Feb 12 22:30:15.506076 systemd-logind[1464]: Removed session 12. Feb 12 22:30:15.421000 audit[6601]: CRED_ACQ pid=6601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:15.598757 kernel: audit: type=1101 audit(1707777015.414:1642): pid=6601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:15.598795 kernel: audit: type=1103 audit(1707777015.421:1643): pid=6601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:15.598813 kernel: audit: type=1006 audit(1707777015.421:1644): pid=6601 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 22:30:15.657553 kernel: audit: type=1300 audit(1707777015.421:1644): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe39f00ea0 a2=3 a3=0 items=0 ppid=1 pid=6601 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:15.421000 audit[6601]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe39f00ea0 a2=3 a3=0 items=0 ppid=1 pid=6601 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:15.749902 kernel: audit: type=1327 audit(1707777015.421:1644): proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:15.421000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:15.780570 kernel: audit: type=1105 audit(1707777015.426:1645): pid=6601 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:15.426000 audit[6601]: USER_START pid=6601 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:15.875571 kernel: audit: type=1103 audit(1707777015.426:1646): pid=6603 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:15.426000 audit[6603]: CRED_ACQ pid=6603 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:15.503000 audit[6601]: USER_END pid=6601 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:16.061276 kernel: audit: type=1106 audit(1707777015.503:1647): pid=6601 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:16.061314 kernel: audit: type=1104 audit(1707777015.503:1648): pid=6601 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:15.503000 audit[6601]: CRED_DISP pid=6601 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:15.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.49.97:22-139.178.68.195:44288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:20.508139 systemd[1]: Started sshd@27-147.75.49.97:22-139.178.68.195:39756.service. Feb 12 22:30:20.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.49.97:22-139.178.68.195:39756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:20.535445 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:30:20.535522 kernel: audit: type=1130 audit(1707777020.507:1650): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.49.97:22-139.178.68.195:39756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:20.649972 sshd[6655]: Accepted publickey for core from 139.178.68.195 port 39756 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:20.648000 audit[6655]: USER_ACCT pid=6655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:20.651230 sshd[6655]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:20.653821 systemd-logind[1464]: New session 13 of user core. Feb 12 22:30:20.654444 systemd[1]: Started session-13.scope. Feb 12 22:30:20.734753 sshd[6655]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:20.736143 systemd[1]: sshd@27-147.75.49.97:22-139.178.68.195:39756.service: Deactivated successfully. Feb 12 22:30:20.736579 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 22:30:20.736870 systemd-logind[1464]: Session 13 logged out. Waiting for processes to exit. Feb 12 22:30:20.737337 systemd-logind[1464]: Removed session 13. Feb 12 22:30:20.650000 audit[6655]: CRED_ACQ pid=6655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:20.832317 kernel: audit: type=1101 audit(1707777020.648:1651): pid=6655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:20.832374 kernel: audit: type=1103 audit(1707777020.650:1652): pid=6655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:20.832396 kernel: audit: type=1006 audit(1707777020.650:1653): pid=6655 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 12 22:30:20.650000 audit[6655]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b6b5a30 a2=3 a3=0 items=0 ppid=1 pid=6655 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:20.983745 kernel: audit: type=1300 audit(1707777020.650:1653): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b6b5a30 a2=3 a3=0 items=0 ppid=1 pid=6655 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:20.983776 kernel: audit: type=1327 audit(1707777020.650:1653): proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:20.650000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:21.014430 kernel: audit: type=1105 audit(1707777020.655:1654): pid=6655 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:20.655000 audit[6655]: USER_START pid=6655 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:21.109449 kernel: audit: type=1103 audit(1707777020.656:1655): pid=6657 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:20.656000 audit[6657]: CRED_ACQ pid=6657 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:21.198699 kernel: audit: type=1106 audit(1707777020.734:1656): pid=6655 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:20.734000 audit[6655]: USER_END pid=6655 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:21.294212 kernel: audit: type=1104 audit(1707777020.734:1657): pid=6655 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:20.734000 audit[6655]: CRED_DISP pid=6655 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:20.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.49.97:22-139.178.68.195:39756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:25.744579 systemd[1]: Started sshd@28-147.75.49.97:22-139.178.68.195:39762.service. Feb 12 22:30:25.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.49.97:22-139.178.68.195:39762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:25.771736 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:30:25.771788 kernel: audit: type=1130 audit(1707777025.743:1659): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.49.97:22-139.178.68.195:39762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:25.886000 audit[6682]: USER_ACCT pid=6682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:25.887163 sshd[6682]: Accepted publickey for core from 139.178.68.195 port 39762 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:25.888828 sshd[6682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:25.891259 systemd-logind[1464]: New session 14 of user core. Feb 12 22:30:25.891719 systemd[1]: Started session-14.scope. Feb 12 22:30:25.887000 audit[6682]: CRED_ACQ pid=6682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:26.068888 kernel: audit: type=1101 audit(1707777025.886:1660): pid=6682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:26.068931 kernel: audit: type=1103 audit(1707777025.887:1661): pid=6682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:26.068952 kernel: audit: type=1006 audit(1707777025.887:1662): pid=6682 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 12 22:30:26.127445 kernel: audit: type=1300 audit(1707777025.887:1662): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe4f8c620 a2=3 a3=0 items=0 ppid=1 pid=6682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:25.887000 audit[6682]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe4f8c620 a2=3 a3=0 items=0 ppid=1 pid=6682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:26.219483 kernel: audit: type=1327 audit(1707777025.887:1662): proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:25.887000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:26.219721 sshd[6682]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:26.221056 systemd[1]: sshd@28-147.75.49.97:22-139.178.68.195:39762.service: Deactivated successfully. Feb 12 22:30:26.221487 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 22:30:26.221776 systemd-logind[1464]: Session 14 logged out. Waiting for processes to exit. Feb 12 22:30:26.222304 systemd-logind[1464]: Removed session 14. Feb 12 22:30:26.250001 kernel: audit: type=1105 audit(1707777025.892:1663): pid=6682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:25.892000 audit[6682]: USER_START pid=6682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:26.344454 kernel: audit: type=1103 audit(1707777025.893:1664): pid=6684 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:25.893000 audit[6684]: CRED_ACQ pid=6684 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:26.433658 kernel: audit: type=1106 audit(1707777026.219:1665): pid=6682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:26.219000 audit[6682]: USER_END pid=6682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:26.529161 kernel: audit: type=1104 audit(1707777026.219:1666): pid=6682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:26.219000 audit[6682]: CRED_DISP pid=6682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:26.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.49.97:22-139.178.68.195:39762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:31.174743 systemd[1]: Started sshd@29-147.75.49.97:22-139.178.68.195:37106.service. Feb 12 22:30:31.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.49.97:22-139.178.68.195:37106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:31.202311 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:30:31.202376 kernel: audit: type=1130 audit(1707777031.174:1668): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.49.97:22-139.178.68.195:37106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:31.316000 audit[6709]: USER_ACCT pid=6709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.317920 sshd[6709]: Accepted publickey for core from 139.178.68.195 port 37106 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:31.321313 sshd[6709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:31.330778 systemd-logind[1464]: New session 15 of user core. Feb 12 22:30:31.333129 systemd[1]: Started session-15.scope. Feb 12 22:30:31.319000 audit[6709]: CRED_ACQ pid=6709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.422245 sshd[6709]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:31.423674 systemd[1]: sshd@29-147.75.49.97:22-139.178.68.195:37106.service: Deactivated successfully. Feb 12 22:30:31.424115 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 22:30:31.424509 systemd-logind[1464]: Session 15 logged out. Waiting for processes to exit. Feb 12 22:30:31.424949 systemd-logind[1464]: Removed session 15. Feb 12 22:30:31.499716 kernel: audit: type=1101 audit(1707777031.316:1669): pid=6709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.499752 kernel: audit: type=1103 audit(1707777031.319:1670): pid=6709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.499769 kernel: audit: type=1006 audit(1707777031.319:1671): pid=6709 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 22:30:31.558311 kernel: audit: type=1300 audit(1707777031.319:1671): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9a4f75e0 a2=3 a3=0 items=0 ppid=1 pid=6709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:31.319000 audit[6709]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9a4f75e0 a2=3 a3=0 items=0 ppid=1 pid=6709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:31.650311 kernel: audit: type=1327 audit(1707777031.319:1671): proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:31.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:31.680831 kernel: audit: type=1105 audit(1707777031.342:1672): pid=6709 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.342000 audit[6709]: USER_START pid=6709 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.775391 kernel: audit: type=1103 audit(1707777031.344:1673): pid=6711 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.344000 audit[6711]: CRED_ACQ pid=6711 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.864797 kernel: audit: type=1106 audit(1707777031.422:1674): pid=6709 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.422000 audit[6709]: USER_END pid=6709 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.422000 audit[6709]: CRED_DISP pid=6709 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:32.049728 kernel: audit: type=1104 audit(1707777031.422:1675): pid=6709 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:31.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.49.97:22-139.178.68.195:37106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:36.433646 systemd[1]: Started sshd@30-147.75.49.97:22-139.178.68.195:48584.service. Feb 12 22:30:36.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.49.97:22-139.178.68.195:48584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:36.475079 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:30:36.475165 kernel: audit: type=1130 audit(1707777036.433:1677): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.49.97:22-139.178.68.195:48584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:36.587000 audit[6747]: USER_ACCT pid=6747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:36.588337 sshd[6747]: Accepted publickey for core from 139.178.68.195 port 48584 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:36.589615 sshd[6747]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:36.592084 systemd-logind[1464]: New session 16 of user core. Feb 12 22:30:36.592579 systemd[1]: Started session-16.scope. Feb 12 22:30:36.673283 sshd[6747]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:36.674656 systemd[1]: sshd@30-147.75.49.97:22-139.178.68.195:48584.service: Deactivated successfully. Feb 12 22:30:36.675089 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 22:30:36.675454 systemd-logind[1464]: Session 16 logged out. Waiting for processes to exit. Feb 12 22:30:36.675875 systemd-logind[1464]: Removed session 16. Feb 12 22:30:36.588000 audit[6747]: CRED_ACQ pid=6747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:36.770179 kernel: audit: type=1101 audit(1707777036.587:1678): pid=6747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:36.770221 kernel: audit: type=1103 audit(1707777036.588:1679): pid=6747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:36.770238 kernel: audit: type=1006 audit(1707777036.588:1680): pid=6747 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 22:30:36.828916 kernel: audit: type=1300 audit(1707777036.588:1680): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff521ee980 a2=3 a3=0 items=0 ppid=1 pid=6747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:36.588000 audit[6747]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff521ee980 a2=3 a3=0 items=0 ppid=1 pid=6747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:36.588000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:36.951436 kernel: audit: type=1327 audit(1707777036.588:1680): proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:36.951498 kernel: audit: type=1105 audit(1707777036.593:1681): pid=6747 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:36.593000 audit[6747]: USER_START pid=6747 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:36.594000 audit[6749]: CRED_ACQ pid=6749 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:37.135308 kernel: audit: type=1103 audit(1707777036.594:1682): pid=6749 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:37.135372 kernel: audit: type=1106 audit(1707777036.673:1683): pid=6747 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:36.673000 audit[6747]: USER_END pid=6747 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:36.673000 audit[6747]: CRED_DISP pid=6747 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:37.320186 kernel: audit: type=1104 audit(1707777036.673:1684): pid=6747 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:36.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.49.97:22-139.178.68.195:48584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:39.428800 systemd[1]: Started sshd@31-147.75.49.97:22-43.140.199.211:36390.service. Feb 12 22:30:39.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.49.97:22-43.140.199.211:36390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:40.797071 systemd[1]: Started sshd@32-147.75.49.97:22-141.98.11.11:47854.service. Feb 12 22:30:40.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.49.97:22-141.98.11.11:47854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:41.682026 systemd[1]: Started sshd@33-147.75.49.97:22-139.178.68.195:48588.service. Feb 12 22:30:41.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.49.97:22-139.178.68.195:48588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:41.708540 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 12 22:30:41.708581 kernel: audit: type=1130 audit(1707777041.681:1688): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.49.97:22-139.178.68.195:48588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:41.822000 audit[6780]: USER_ACCT pid=6780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:41.823368 sshd[6780]: Accepted publickey for core from 139.178.68.195 port 48588 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:41.824225 sshd[6780]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:41.826423 systemd-logind[1464]: New session 17 of user core. Feb 12 22:30:41.826980 systemd[1]: Started session-17.scope. Feb 12 22:30:41.908006 sshd[6780]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:41.910029 systemd[1]: sshd@33-147.75.49.97:22-139.178.68.195:48588.service: Deactivated successfully. Feb 12 22:30:41.910384 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 22:30:41.910693 systemd-logind[1464]: Session 17 logged out. Waiting for processes to exit. Feb 12 22:30:41.911372 systemd[1]: Started sshd@34-147.75.49.97:22-139.178.68.195:48590.service. Feb 12 22:30:41.911749 systemd-logind[1464]: Removed session 17. Feb 12 22:30:41.823000 audit[6780]: CRED_ACQ pid=6780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:41.959806 sshd[6776]: Invalid user username from 141.98.11.11 port 47854 Feb 12 22:30:42.006585 kernel: audit: type=1101 audit(1707777041.822:1689): pid=6780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.006624 kernel: audit: type=1103 audit(1707777041.823:1690): pid=6780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.006645 kernel: audit: type=1006 audit(1707777041.823:1691): pid=6780 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 22:30:42.065166 kernel: audit: type=1300 audit(1707777041.823:1691): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdbae6f90 a2=3 a3=0 items=0 ppid=1 pid=6780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:41.823000 audit[6780]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdbae6f90 a2=3 a3=0 items=0 ppid=1 pid=6780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:42.089304 sshd[6805]: Accepted publickey for core from 139.178.68.195 port 48590 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:42.090206 sshd[6805]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:42.092578 systemd-logind[1464]: New session 18 of user core. Feb 12 22:30:42.093000 systemd[1]: Started session-18.scope. Feb 12 22:30:42.157116 kernel: audit: type=1327 audit(1707777041.823:1691): proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:41.823000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:42.158481 sshd[6776]: pam_faillock(sshd:auth): User unknown Feb 12 22:30:42.158737 sshd[6776]: pam_unix(sshd:auth): check pass; user unknown Feb 12 22:30:42.158754 sshd[6776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.11 Feb 12 22:30:42.158948 sshd[6776]: pam_faillock(sshd:auth): User unknown Feb 12 22:30:41.828000 audit[6780]: USER_START pid=6780 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.282089 kernel: audit: type=1105 audit(1707777041.828:1692): pid=6780 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.282171 kernel: audit: type=1103 audit(1707777041.829:1693): pid=6782 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:41.829000 audit[6782]: CRED_ACQ pid=6782 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.371311 kernel: audit: type=1106 audit(1707777041.907:1694): pid=6780 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:41.907000 audit[6780]: USER_END pid=6780 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.466809 kernel: audit: type=1104 audit(1707777041.907:1695): pid=6780 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:41.907000 audit[6780]: CRED_DISP pid=6780 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:41.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.49.97:22-139.178.68.195:48588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:41.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.49.97:22-139.178.68.195:48590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:42.088000 audit[6805]: USER_ACCT pid=6805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.089000 audit[6805]: CRED_ACQ pid=6805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.089000 audit[6805]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe994776f0 a2=3 a3=0 items=0 ppid=1 pid=6805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:42.089000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:42.094000 audit[6805]: USER_START pid=6805 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.094000 audit[6807]: CRED_ACQ pid=6807 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.158000 audit[6776]: USER_AUTH pid=6776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="username" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 12 22:30:42.627680 sshd[6805]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:42.627000 audit[6805]: USER_END pid=6805 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.627000 audit[6805]: CRED_DISP pid=6805 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.629523 systemd[1]: sshd@34-147.75.49.97:22-139.178.68.195:48590.service: Deactivated successfully. Feb 12 22:30:42.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.49.97:22-139.178.68.195:48590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:42.629887 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 22:30:42.630183 systemd-logind[1464]: Session 18 logged out. Waiting for processes to exit. Feb 12 22:30:42.630843 systemd[1]: Started sshd@35-147.75.49.97:22-139.178.68.195:48598.service. Feb 12 22:30:42.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.49.97:22-139.178.68.195:48598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:42.631225 systemd-logind[1464]: Removed session 18. Feb 12 22:30:42.660000 audit[6829]: USER_ACCT pid=6829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.661939 sshd[6829]: Accepted publickey for core from 139.178.68.195 port 48598 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:42.662000 audit[6829]: CRED_ACQ pid=6829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.663000 audit[6829]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf0b8fc50 a2=3 a3=0 items=0 ppid=1 pid=6829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:42.663000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:42.664712 sshd[6829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:42.674421 systemd-logind[1464]: New session 19 of user core. Feb 12 22:30:42.676783 systemd[1]: Started session-19.scope. Feb 12 22:30:42.690000 audit[6829]: USER_START pid=6829 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.693000 audit[6832]: CRED_ACQ pid=6832 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.817595 sshd[6829]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:42.817000 audit[6829]: USER_END pid=6829 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.817000 audit[6829]: CRED_DISP pid=6829 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:42.818940 systemd[1]: sshd@35-147.75.49.97:22-139.178.68.195:48598.service: Deactivated successfully. Feb 12 22:30:42.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.49.97:22-139.178.68.195:48598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:42.819374 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 22:30:42.819710 systemd-logind[1464]: Session 19 logged out. Waiting for processes to exit. Feb 12 22:30:42.820298 systemd-logind[1464]: Removed session 19. Feb 12 22:30:44.234320 sshd[6776]: Failed password for invalid user username from 141.98.11.11 port 47854 ssh2 Feb 12 22:30:46.335200 sshd[6776]: Connection closed by invalid user username 141.98.11.11 port 47854 [preauth] Feb 12 22:30:46.337796 systemd[1]: sshd@32-147.75.49.97:22-141.98.11.11:47854.service: Deactivated successfully. Feb 12 22:30:46.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.49.97:22-141.98.11.11:47854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:47.827590 systemd[1]: Started sshd@36-147.75.49.97:22-139.178.68.195:46704.service. Feb 12 22:30:47.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.49.97:22-139.178.68.195:46704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:47.854646 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 22:30:47.854698 kernel: audit: type=1130 audit(1707777047.826:1717): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.49.97:22-139.178.68.195:46704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:47.969000 audit[6884]: USER_ACCT pid=6884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:47.970553 sshd[6884]: Accepted publickey for core from 139.178.68.195 port 46704 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:47.974959 sshd[6884]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:47.978345 systemd-logind[1464]: New session 20 of user core. Feb 12 22:30:47.978866 systemd[1]: Started session-20.scope. Feb 12 22:30:48.057576 sshd[6884]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:48.058933 systemd[1]: sshd@36-147.75.49.97:22-139.178.68.195:46704.service: Deactivated successfully. Feb 12 22:30:48.059350 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 22:30:48.059707 systemd-logind[1464]: Session 20 logged out. Waiting for processes to exit. Feb 12 22:30:48.060211 systemd-logind[1464]: Removed session 20. Feb 12 22:30:47.973000 audit[6884]: CRED_ACQ pid=6884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:48.061975 kernel: audit: type=1101 audit(1707777047.969:1718): pid=6884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:48.062002 kernel: audit: type=1103 audit(1707777047.973:1719): pid=6884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:48.210709 kernel: audit: type=1006 audit(1707777047.973:1720): pid=6884 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 12 22:30:48.210744 kernel: audit: type=1300 audit(1707777047.973:1720): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff190ab510 a2=3 a3=0 items=0 ppid=1 pid=6884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:47.973000 audit[6884]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff190ab510 a2=3 a3=0 items=0 ppid=1 pid=6884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:48.302681 kernel: audit: type=1327 audit(1707777047.973:1720): proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:47.973000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:48.333169 kernel: audit: type=1105 audit(1707777047.980:1721): pid=6884 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:47.980000 audit[6884]: USER_START pid=6884 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:48.427628 kernel: audit: type=1103 audit(1707777047.980:1722): pid=6886 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:47.980000 audit[6886]: CRED_ACQ pid=6886 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:48.516799 kernel: audit: type=1106 audit(1707777048.057:1723): pid=6884 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:48.057000 audit[6884]: USER_END pid=6884 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:48.612302 kernel: audit: type=1104 audit(1707777048.057:1724): pid=6884 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:48.057000 audit[6884]: CRED_DISP pid=6884 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:48.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.49.97:22-139.178.68.195:46704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:53.067306 systemd[1]: Started sshd@37-147.75.49.97:22-139.178.68.195:46710.service. Feb 12 22:30:53.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.49.97:22-139.178.68.195:46710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:53.094201 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:30:53.094251 kernel: audit: type=1130 audit(1707777053.066:1726): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.49.97:22-139.178.68.195:46710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:53.208000 audit[6913]: USER_ACCT pid=6913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.210096 sshd[6913]: Accepted publickey for core from 139.178.68.195 port 46710 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:53.213638 sshd[6913]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:53.218372 systemd-logind[1464]: New session 21 of user core. Feb 12 22:30:53.218806 systemd[1]: Started session-21.scope. Feb 12 22:30:53.298079 sshd[6913]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:53.299532 systemd[1]: sshd@37-147.75.49.97:22-139.178.68.195:46710.service: Deactivated successfully. Feb 12 22:30:53.299963 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 22:30:53.300305 systemd-logind[1464]: Session 21 logged out. Waiting for processes to exit. Feb 12 22:30:53.300708 systemd-logind[1464]: Removed session 21. Feb 12 22:30:53.211000 audit[6913]: CRED_ACQ pid=6913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.391513 kernel: audit: type=1101 audit(1707777053.208:1727): pid=6913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.391558 kernel: audit: type=1103 audit(1707777053.211:1728): pid=6913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.391576 kernel: audit: type=1006 audit(1707777053.211:1729): pid=6913 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 12 22:30:53.211000 audit[6913]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe54329110 a2=3 a3=0 items=0 ppid=1 pid=6913 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:53.542004 kernel: audit: type=1300 audit(1707777053.211:1729): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe54329110 a2=3 a3=0 items=0 ppid=1 pid=6913 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:53.542030 kernel: audit: type=1327 audit(1707777053.211:1729): proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:53.211000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:53.572530 kernel: audit: type=1105 audit(1707777053.219:1730): pid=6913 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.219000 audit[6913]: USER_START pid=6913 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.667000 kernel: audit: type=1103 audit(1707777053.220:1731): pid=6916 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.220000 audit[6916]: CRED_ACQ pid=6916 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.756248 kernel: audit: type=1106 audit(1707777053.297:1732): pid=6913 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.297000 audit[6913]: USER_END pid=6913 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.851792 kernel: audit: type=1104 audit(1707777053.297:1733): pid=6913 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.297000 audit[6913]: CRED_DISP pid=6913 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:53.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.49.97:22-139.178.68.195:46710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:58.308108 systemd[1]: Started sshd@38-147.75.49.97:22-139.178.68.195:54788.service. Feb 12 22:30:58.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.49.97:22-139.178.68.195:54788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:58.335096 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:30:58.335201 kernel: audit: type=1130 audit(1707777058.307:1735): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.49.97:22-139.178.68.195:54788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:30:58.448000 audit[6939]: USER_ACCT pid=6939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.449544 sshd[6939]: Accepted publickey for core from 139.178.68.195 port 54788 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:30:58.453029 sshd[6939]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:30:58.457948 systemd-logind[1464]: New session 22 of user core. Feb 12 22:30:58.458439 systemd[1]: Started session-22.scope. Feb 12 22:30:58.537883 sshd[6939]: pam_unix(sshd:session): session closed for user core Feb 12 22:30:58.539423 systemd[1]: sshd@38-147.75.49.97:22-139.178.68.195:54788.service: Deactivated successfully. Feb 12 22:30:58.539862 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 22:30:58.540184 systemd-logind[1464]: Session 22 logged out. Waiting for processes to exit. Feb 12 22:30:58.451000 audit[6939]: CRED_ACQ pid=6939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.540605 systemd-logind[1464]: Removed session 22. Feb 12 22:30:58.631153 kernel: audit: type=1101 audit(1707777058.448:1736): pid=6939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.631194 kernel: audit: type=1103 audit(1707777058.451:1737): pid=6939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.631210 kernel: audit: type=1006 audit(1707777058.451:1738): pid=6939 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 22:30:58.689721 kernel: audit: type=1300 audit(1707777058.451:1738): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffccddb0c0 a2=3 a3=0 items=0 ppid=1 pid=6939 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:58.451000 audit[6939]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffccddb0c0 a2=3 a3=0 items=0 ppid=1 pid=6939 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:30:58.781804 kernel: audit: type=1327 audit(1707777058.451:1738): proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:58.451000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:30:58.459000 audit[6939]: USER_START pid=6939 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.906936 kernel: audit: type=1105 audit(1707777058.459:1739): pid=6939 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.906965 kernel: audit: type=1103 audit(1707777058.460:1740): pid=6941 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.460000 audit[6941]: CRED_ACQ pid=6941 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.996240 kernel: audit: type=1106 audit(1707777058.537:1741): pid=6939 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.537000 audit[6939]: USER_END pid=6939 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.537000 audit[6939]: CRED_DISP pid=6939 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:59.181149 kernel: audit: type=1104 audit(1707777058.537:1742): pid=6939 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:30:58.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.49.97:22-139.178.68.195:54788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:03.548098 systemd[1]: Started sshd@39-147.75.49.97:22-139.178.68.195:54798.service. Feb 12 22:31:03.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.49.97:22-139.178.68.195:54798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:03.575826 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:31:03.575911 kernel: audit: type=1130 audit(1707777063.547:1744): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.49.97:22-139.178.68.195:54798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:03.687000 audit[6969]: USER_ACCT pid=6969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:03.688751 sshd[6969]: Accepted publickey for core from 139.178.68.195 port 54798 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:03.691517 sshd[6969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:03.698770 systemd-logind[1464]: New session 23 of user core. Feb 12 22:31:03.700917 systemd[1]: Started session-23.scope. Feb 12 22:31:03.689000 audit[6969]: CRED_ACQ pid=6969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:03.785477 sshd[6969]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:03.786893 systemd[1]: sshd@39-147.75.49.97:22-139.178.68.195:54798.service: Deactivated successfully. Feb 12 22:31:03.787365 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 22:31:03.787736 systemd-logind[1464]: Session 23 logged out. Waiting for processes to exit. Feb 12 22:31:03.788192 systemd-logind[1464]: Removed session 23. Feb 12 22:31:03.870415 kernel: audit: type=1101 audit(1707777063.687:1745): pid=6969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:03.870452 kernel: audit: type=1103 audit(1707777063.689:1746): pid=6969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:03.870470 kernel: audit: type=1006 audit(1707777063.690:1747): pid=6969 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 22:31:03.690000 audit[6969]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff333ad360 a2=3 a3=0 items=0 ppid=1 pid=6969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:04.021072 kernel: audit: type=1300 audit(1707777063.690:1747): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff333ad360 a2=3 a3=0 items=0 ppid=1 pid=6969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:04.021102 kernel: audit: type=1327 audit(1707777063.690:1747): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:03.690000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:04.051615 kernel: audit: type=1105 audit(1707777063.707:1748): pid=6969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:03.707000 audit[6969]: USER_START pid=6969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:03.709000 audit[6971]: CRED_ACQ pid=6971 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:04.235499 kernel: audit: type=1103 audit(1707777063.709:1749): pid=6971 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:04.235596 kernel: audit: type=1106 audit(1707777063.785:1750): pid=6969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:03.785000 audit[6969]: USER_END pid=6969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:04.331104 kernel: audit: type=1104 audit(1707777063.785:1751): pid=6969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:03.785000 audit[6969]: CRED_DISP pid=6969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:03.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.49.97:22-139.178.68.195:54798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:04.080000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:04.080000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:04.080000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0010740c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:31:04.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:31:04.080000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a0f7a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:31:04.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:31:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00ec297a0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:31:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00eac5dc0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:31:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:31:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:31:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c012fd9380 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:31:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:31:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c011397500 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:31:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:31:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00ec29800 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:31:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:31:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c010aa20c0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:31:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:31:07.464000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:07.464000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00111d220 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:31:07.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:31:07.465000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:07.465000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00111d240 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:31:07.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:31:07.465000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:07.465000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b8f60 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:31:07.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:31:07.476000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:31:07.476000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001253340 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:31:07.476000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:31:08.796270 systemd[1]: Started sshd@40-147.75.49.97:22-139.178.68.195:51374.service. Feb 12 22:31:08.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.49.97:22-139.178.68.195:51374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:08.836432 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 12 22:31:08.836494 kernel: audit: type=1130 audit(1707777068.795:1765): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.49.97:22-139.178.68.195:51374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:08.948000 audit[6997]: USER_ACCT pid=6997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:08.949156 sshd[6997]: Accepted publickey for core from 139.178.68.195 port 51374 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:08.950111 sshd[6997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:08.952297 systemd-logind[1464]: New session 24 of user core. Feb 12 22:31:08.952894 systemd[1]: Started session-24.scope. Feb 12 22:31:09.029877 sshd[6997]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:09.031347 systemd[1]: sshd@40-147.75.49.97:22-139.178.68.195:51374.service: Deactivated successfully. Feb 12 22:31:09.031773 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 22:31:09.032100 systemd-logind[1464]: Session 24 logged out. Waiting for processes to exit. Feb 12 22:31:09.032534 systemd-logind[1464]: Removed session 24. Feb 12 22:31:08.948000 audit[6997]: CRED_ACQ pid=6997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:09.131079 kernel: audit: type=1101 audit(1707777068.948:1766): pid=6997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:09.131136 kernel: audit: type=1103 audit(1707777068.948:1767): pid=6997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:09.131163 kernel: audit: type=1006 audit(1707777068.948:1768): pid=6997 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 22:31:08.948000 audit[6997]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4f9b8630 a2=3 a3=0 items=0 ppid=1 pid=6997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:09.281798 kernel: audit: type=1300 audit(1707777068.948:1768): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4f9b8630 a2=3 a3=0 items=0 ppid=1 pid=6997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:09.281860 kernel: audit: type=1327 audit(1707777068.948:1768): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:08.948000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:09.312357 kernel: audit: type=1105 audit(1707777068.954:1769): pid=6997 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:08.954000 audit[6997]: USER_START pid=6997 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:09.406912 kernel: audit: type=1103 audit(1707777068.955:1770): pid=6999 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:08.955000 audit[6999]: CRED_ACQ pid=6999 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:09.496364 kernel: audit: type=1106 audit(1707777069.029:1771): pid=6997 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:09.029000 audit[6997]: USER_END pid=6997 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:09.591927 kernel: audit: type=1104 audit(1707777069.029:1772): pid=6997 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:09.029000 audit[6997]: CRED_DISP pid=6997 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:09.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.49.97:22-139.178.68.195:51374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:14.040029 systemd[1]: Started sshd@41-147.75.49.97:22-139.178.68.195:51380.service. Feb 12 22:31:14.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.49.97:22-139.178.68.195:51380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:14.067185 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:31:14.067251 kernel: audit: type=1130 audit(1707777074.039:1774): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.49.97:22-139.178.68.195:51380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:14.181000 audit[7022]: USER_ACCT pid=7022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.182256 sshd[7022]: Accepted publickey for core from 139.178.68.195 port 51380 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:14.183594 sshd[7022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:14.185844 systemd-logind[1464]: New session 25 of user core. Feb 12 22:31:14.186386 systemd[1]: Started session-25.scope. Feb 12 22:31:14.265121 sshd[7022]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:14.266592 systemd[1]: sshd@41-147.75.49.97:22-139.178.68.195:51380.service: Deactivated successfully. Feb 12 22:31:14.267074 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 22:31:14.267439 systemd-logind[1464]: Session 25 logged out. Waiting for processes to exit. Feb 12 22:31:14.267850 systemd-logind[1464]: Removed session 25. Feb 12 22:31:14.182000 audit[7022]: CRED_ACQ pid=7022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.364161 kernel: audit: type=1101 audit(1707777074.181:1775): pid=7022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.364202 kernel: audit: type=1103 audit(1707777074.182:1776): pid=7022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.364218 kernel: audit: type=1006 audit(1707777074.182:1777): pid=7022 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 22:31:14.422785 kernel: audit: type=1300 audit(1707777074.182:1777): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb47e2260 a2=3 a3=0 items=0 ppid=1 pid=7022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:14.182000 audit[7022]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb47e2260 a2=3 a3=0 items=0 ppid=1 pid=7022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:14.514840 kernel: audit: type=1327 audit(1707777074.182:1777): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:14.182000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:14.545354 kernel: audit: type=1105 audit(1707777074.187:1778): pid=7022 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.187000 audit[7022]: USER_START pid=7022 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.187000 audit[7024]: CRED_ACQ pid=7024 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.729336 kernel: audit: type=1103 audit(1707777074.187:1779): pid=7024 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.729371 kernel: audit: type=1106 audit(1707777074.264:1780): pid=7022 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.264000 audit[7022]: USER_END pid=7022 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.824889 kernel: audit: type=1104 audit(1707777074.265:1781): pid=7022 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.265000 audit[7022]: CRED_DISP pid=7022 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:14.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.49.97:22-139.178.68.195:51380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:19.274478 systemd[1]: Started sshd@42-147.75.49.97:22-139.178.68.195:60052.service. Feb 12 22:31:19.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.49.97:22-139.178.68.195:60052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:19.301407 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:31:19.301459 kernel: audit: type=1130 audit(1707777079.273:1783): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.49.97:22-139.178.68.195:60052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:19.414000 audit[7073]: USER_ACCT pid=7073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.415890 sshd[7073]: Accepted publickey for core from 139.178.68.195 port 60052 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:19.417236 sshd[7073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:19.419602 systemd-logind[1464]: New session 26 of user core. Feb 12 22:31:19.420299 systemd[1]: Started session-26.scope. Feb 12 22:31:19.416000 audit[7073]: CRED_ACQ pid=7073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.597853 kernel: audit: type=1101 audit(1707777079.414:1784): pid=7073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.597887 kernel: audit: type=1103 audit(1707777079.416:1785): pid=7073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.597903 kernel: audit: type=1006 audit(1707777079.416:1786): pid=7073 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 22:31:19.656464 kernel: audit: type=1300 audit(1707777079.416:1786): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde081cfb0 a2=3 a3=0 items=0 ppid=1 pid=7073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:19.416000 audit[7073]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde081cfb0 a2=3 a3=0 items=0 ppid=1 pid=7073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:19.748566 kernel: audit: type=1327 audit(1707777079.416:1786): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:19.416000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:19.748814 sshd[7073]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:19.750329 systemd[1]: sshd@42-147.75.49.97:22-139.178.68.195:60052.service: Deactivated successfully. Feb 12 22:31:19.750803 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 22:31:19.751180 systemd-logind[1464]: Session 26 logged out. Waiting for processes to exit. Feb 12 22:31:19.751686 systemd-logind[1464]: Removed session 26. Feb 12 22:31:19.779115 kernel: audit: type=1105 audit(1707777079.421:1787): pid=7073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.421000 audit[7073]: USER_START pid=7073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.422000 audit[7075]: CRED_ACQ pid=7075 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.963074 kernel: audit: type=1103 audit(1707777079.422:1788): pid=7075 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.963116 kernel: audit: type=1106 audit(1707777079.748:1789): pid=7073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.748000 audit[7073]: USER_END pid=7073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.748000 audit[7073]: CRED_DISP pid=7073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:20.147954 kernel: audit: type=1104 audit(1707777079.748:1790): pid=7073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:19.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.49.97:22-139.178.68.195:60052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:24.699557 systemd[1]: Started sshd@43-147.75.49.97:22-139.178.68.195:60056.service. Feb 12 22:31:24.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.49.97:22-139.178.68.195:60056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:24.726526 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:31:24.726602 kernel: audit: type=1130 audit(1707777084.698:1792): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.49.97:22-139.178.68.195:60056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:24.839000 audit[7101]: USER_ACCT pid=7101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:24.840726 sshd[7101]: Accepted publickey for core from 139.178.68.195 port 60056 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:24.842696 sshd[7101]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:24.848481 systemd-logind[1464]: New session 27 of user core. Feb 12 22:31:24.849751 systemd[1]: Started session-27.scope. Feb 12 22:31:24.841000 audit[7101]: CRED_ACQ pid=7101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:24.934519 sshd[7101]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:24.935982 systemd[1]: sshd@43-147.75.49.97:22-139.178.68.195:60056.service: Deactivated successfully. Feb 12 22:31:24.936402 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 22:31:24.936753 systemd-logind[1464]: Session 27 logged out. Waiting for processes to exit. Feb 12 22:31:24.937276 systemd-logind[1464]: Removed session 27. Feb 12 22:31:25.022546 kernel: audit: type=1101 audit(1707777084.839:1793): pid=7101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:25.022584 kernel: audit: type=1103 audit(1707777084.841:1794): pid=7101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:25.022599 kernel: audit: type=1006 audit(1707777084.841:1795): pid=7101 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 12 22:31:25.081177 kernel: audit: type=1300 audit(1707777084.841:1795): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde7f9af10 a2=3 a3=0 items=0 ppid=1 pid=7101 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:24.841000 audit[7101]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde7f9af10 a2=3 a3=0 items=0 ppid=1 pid=7101 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:25.173307 kernel: audit: type=1327 audit(1707777084.841:1795): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:24.841000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:25.203823 kernel: audit: type=1105 audit(1707777084.856:1796): pid=7101 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:24.856000 audit[7101]: USER_START pid=7101 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:25.298324 kernel: audit: type=1103 audit(1707777084.857:1797): pid=7103 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:24.857000 audit[7103]: CRED_ACQ pid=7103 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:25.387553 kernel: audit: type=1106 audit(1707777084.934:1798): pid=7101 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:24.934000 audit[7101]: USER_END pid=7101 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:25.483147 kernel: audit: type=1104 audit(1707777084.934:1799): pid=7101 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:24.934000 audit[7101]: CRED_DISP pid=7101 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:24.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.49.97:22-139.178.68.195:60056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:29.944226 systemd[1]: Started sshd@44-147.75.49.97:22-139.178.68.195:34296.service. Feb 12 22:31:29.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.49.97:22-139.178.68.195:34296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:29.970838 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:31:29.970891 kernel: audit: type=1130 audit(1707777089.943:1801): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.49.97:22-139.178.68.195:34296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:30.085000 audit[7125]: USER_ACCT pid=7125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.086516 sshd[7125]: Accepted publickey for core from 139.178.68.195 port 34296 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:30.090247 sshd[7125]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:30.095124 systemd-logind[1464]: New session 28 of user core. Feb 12 22:31:30.095631 systemd[1]: Started session-28.scope. Feb 12 22:31:30.172746 sshd[7125]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:30.174082 systemd[1]: sshd@44-147.75.49.97:22-139.178.68.195:34296.service: Deactivated successfully. Feb 12 22:31:30.174498 systemd[1]: session-28.scope: Deactivated successfully. Feb 12 22:31:30.174820 systemd-logind[1464]: Session 28 logged out. Waiting for processes to exit. Feb 12 22:31:30.175447 systemd-logind[1464]: Removed session 28. Feb 12 22:31:30.088000 audit[7125]: CRED_ACQ pid=7125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.267986 kernel: audit: type=1101 audit(1707777090.085:1802): pid=7125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.268024 kernel: audit: type=1103 audit(1707777090.088:1803): pid=7125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.268040 kernel: audit: type=1006 audit(1707777090.088:1804): pid=7125 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 12 22:31:30.326626 kernel: audit: type=1300 audit(1707777090.088:1804): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc04e58620 a2=3 a3=0 items=0 ppid=1 pid=7125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:30.088000 audit[7125]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc04e58620 a2=3 a3=0 items=0 ppid=1 pid=7125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:30.418603 kernel: audit: type=1327 audit(1707777090.088:1804): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:30.088000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:30.449101 kernel: audit: type=1105 audit(1707777090.096:1805): pid=7125 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.096000 audit[7125]: USER_START pid=7125 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.543575 kernel: audit: type=1103 audit(1707777090.097:1806): pid=7128 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.097000 audit[7128]: CRED_ACQ pid=7128 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.172000 audit[7125]: USER_END pid=7125 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.728353 kernel: audit: type=1106 audit(1707777090.172:1807): pid=7125 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.728423 kernel: audit: type=1104 audit(1707777090.172:1808): pid=7125 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.172000 audit[7125]: CRED_DISP pid=7125 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:30.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.49.97:22-139.178.68.195:34296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:35.184999 systemd[1]: Started sshd@45-147.75.49.97:22-139.178.68.195:34306.service. Feb 12 22:31:35.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.49.97:22-139.178.68.195:34306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:35.227980 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:31:35.228080 kernel: audit: type=1130 audit(1707777095.184:1810): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.49.97:22-139.178.68.195:34306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:35.340000 audit[7152]: USER_ACCT pid=7152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.341755 sshd[7152]: Accepted publickey for core from 139.178.68.195 port 34306 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:35.342695 sshd[7152]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:35.346545 systemd-logind[1464]: New session 29 of user core. Feb 12 22:31:35.347245 systemd[1]: Started session-29.scope. Feb 12 22:31:35.428966 sshd[7152]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:35.430457 systemd[1]: sshd@45-147.75.49.97:22-139.178.68.195:34306.service: Deactivated successfully. Feb 12 22:31:35.430935 systemd[1]: session-29.scope: Deactivated successfully. Feb 12 22:31:35.431275 systemd-logind[1464]: Session 29 logged out. Waiting for processes to exit. Feb 12 22:31:35.431689 systemd-logind[1464]: Removed session 29. Feb 12 22:31:35.341000 audit[7152]: CRED_ACQ pid=7152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.523449 kernel: audit: type=1101 audit(1707777095.340:1811): pid=7152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.523489 kernel: audit: type=1103 audit(1707777095.341:1812): pid=7152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.523508 kernel: audit: type=1006 audit(1707777095.341:1813): pid=7152 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 12 22:31:35.341000 audit[7152]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd60fbae0 a2=3 a3=0 items=0 ppid=1 pid=7152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:35.674004 kernel: audit: type=1300 audit(1707777095.341:1813): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd60fbae0 a2=3 a3=0 items=0 ppid=1 pid=7152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:35.341000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:35.704598 kernel: audit: type=1327 audit(1707777095.341:1813): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:35.704633 kernel: audit: type=1105 audit(1707777095.347:1814): pid=7152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.347000 audit[7152]: USER_START pid=7152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.347000 audit[7154]: CRED_ACQ pid=7154 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.888326 kernel: audit: type=1103 audit(1707777095.347:1815): pid=7154 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.888363 kernel: audit: type=1106 audit(1707777095.428:1816): pid=7152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.428000 audit[7152]: USER_END pid=7152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.983849 kernel: audit: type=1104 audit(1707777095.428:1817): pid=7152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.428000 audit[7152]: CRED_DISP pid=7152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:35.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.49.97:22-139.178.68.195:34306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:40.438646 systemd[1]: Started sshd@46-147.75.49.97:22-139.178.68.195:43604.service. Feb 12 22:31:40.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.49.97:22-139.178.68.195:43604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:40.465822 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:31:40.465891 kernel: audit: type=1130 audit(1707777100.437:1819): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.49.97:22-139.178.68.195:43604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:40.579000 audit[7177]: USER_ACCT pid=7177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:40.580718 sshd[7177]: Accepted publickey for core from 139.178.68.195 port 43604 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:40.583164 sshd[7177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:40.587423 systemd-logind[1464]: New session 30 of user core. Feb 12 22:31:40.588343 systemd[1]: Started session-30.scope. Feb 12 22:31:40.669416 sshd[7177]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:40.670694 systemd[1]: sshd@46-147.75.49.97:22-139.178.68.195:43604.service: Deactivated successfully. Feb 12 22:31:40.671162 systemd[1]: session-30.scope: Deactivated successfully. Feb 12 22:31:40.671604 systemd-logind[1464]: Session 30 logged out. Waiting for processes to exit. Feb 12 22:31:40.672129 systemd-logind[1464]: Removed session 30. Feb 12 22:31:40.581000 audit[7177]: CRED_ACQ pid=7177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:40.764266 kernel: audit: type=1101 audit(1707777100.579:1820): pid=7177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:40.764304 kernel: audit: type=1103 audit(1707777100.581:1821): pid=7177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:40.764321 kernel: audit: type=1006 audit(1707777100.581:1822): pid=7177 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 12 22:31:40.822818 kernel: audit: type=1300 audit(1707777100.581:1822): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe342f9210 a2=3 a3=0 items=0 ppid=1 pid=7177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:40.581000 audit[7177]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe342f9210 a2=3 a3=0 items=0 ppid=1 pid=7177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:40.581000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:40.945403 kernel: audit: type=1327 audit(1707777100.581:1822): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:40.945435 kernel: audit: type=1105 audit(1707777100.589:1823): pid=7177 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:40.589000 audit[7177]: USER_START pid=7177 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:41.039840 kernel: audit: type=1103 audit(1707777100.590:1824): pid=7179 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:40.590000 audit[7179]: CRED_ACQ pid=7179 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:41.129086 kernel: audit: type=1106 audit(1707777100.669:1825): pid=7177 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:40.669000 audit[7177]: USER_END pid=7177 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:41.224696 kernel: audit: type=1104 audit(1707777100.669:1826): pid=7177 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:40.669000 audit[7177]: CRED_DISP pid=7177 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:40.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.49.97:22-139.178.68.195:43604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:45.679534 systemd[1]: Started sshd@47-147.75.49.97:22-139.178.68.195:43618.service. Feb 12 22:31:45.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.49.97:22-139.178.68.195:43618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:45.706374 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:31:45.706439 kernel: audit: type=1130 audit(1707777105.678:1828): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.49.97:22-139.178.68.195:43618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:45.819000 audit[7203]: USER_ACCT pid=7203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:45.821019 sshd[7203]: Accepted publickey for core from 139.178.68.195 port 43618 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:45.822201 sshd[7203]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:45.824504 systemd-logind[1464]: New session 31 of user core. Feb 12 22:31:45.825039 systemd[1]: Started session-31.scope. Feb 12 22:31:45.904974 sshd[7203]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:45.906479 systemd[1]: sshd@47-147.75.49.97:22-139.178.68.195:43618.service: Deactivated successfully. Feb 12 22:31:45.906945 systemd[1]: session-31.scope: Deactivated successfully. Feb 12 22:31:45.907280 systemd-logind[1464]: Session 31 logged out. Waiting for processes to exit. Feb 12 22:31:45.907704 systemd-logind[1464]: Removed session 31. Feb 12 22:31:45.821000 audit[7203]: CRED_ACQ pid=7203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:46.003991 kernel: audit: type=1101 audit(1707777105.819:1829): pid=7203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:46.004035 kernel: audit: type=1103 audit(1707777105.821:1830): pid=7203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:46.004049 kernel: audit: type=1006 audit(1707777105.821:1831): pid=7203 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Feb 12 22:31:46.031941 systemd[1]: Started sshd@48-147.75.49.97:22-101.43.12.38:60334.service. Feb 12 22:31:46.062589 kernel: audit: type=1300 audit(1707777105.821:1831): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6cc26b10 a2=3 a3=0 items=0 ppid=1 pid=7203 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:45.821000 audit[7203]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6cc26b10 a2=3 a3=0 items=0 ppid=1 pid=7203 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:46.154565 kernel: audit: type=1327 audit(1707777105.821:1831): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:45.821000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:46.185163 kernel: audit: type=1105 audit(1707777105.826:1832): pid=7203 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:45.826000 audit[7203]: USER_START pid=7203 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:46.279653 kernel: audit: type=1103 audit(1707777105.826:1833): pid=7205 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:45.826000 audit[7205]: CRED_ACQ pid=7205 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:46.368845 kernel: audit: type=1106 audit(1707777105.904:1834): pid=7203 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:45.904000 audit[7203]: USER_END pid=7203 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:46.464444 kernel: audit: type=1104 audit(1707777105.904:1835): pid=7203 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:45.904000 audit[7203]: CRED_DISP pid=7203 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:45.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.49.97:22-139.178.68.195:43618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:46.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.49.97:22-101.43.12.38:60334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:50.917174 systemd[1]: Started sshd@49-147.75.49.97:22-139.178.68.195:48170.service. Feb 12 22:31:50.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.49.97:22-139.178.68.195:48170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:50.944283 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 22:31:50.944417 kernel: audit: type=1130 audit(1707777110.916:1838): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.49.97:22-139.178.68.195:48170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:51.057000 audit[7257]: USER_ACCT pid=7257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.058661 sshd[7257]: Accepted publickey for core from 139.178.68.195 port 48170 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:51.060714 sshd[7257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:51.066429 systemd-logind[1464]: New session 32 of user core. Feb 12 22:31:51.067847 systemd[1]: Started session-32.scope. Feb 12 22:31:51.059000 audit[7257]: CRED_ACQ pid=7257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.156029 sshd[7257]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:51.157454 systemd[1]: sshd@49-147.75.49.97:22-139.178.68.195:48170.service: Deactivated successfully. Feb 12 22:31:51.157891 systemd[1]: session-32.scope: Deactivated successfully. Feb 12 22:31:51.158338 systemd-logind[1464]: Session 32 logged out. Waiting for processes to exit. Feb 12 22:31:51.158828 systemd-logind[1464]: Removed session 32. Feb 12 22:31:51.241499 kernel: audit: type=1101 audit(1707777111.057:1839): pid=7257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.241547 kernel: audit: type=1103 audit(1707777111.059:1840): pid=7257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.241567 kernel: audit: type=1006 audit(1707777111.059:1841): pid=7257 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 12 22:31:51.300085 kernel: audit: type=1300 audit(1707777111.059:1841): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff36e18620 a2=3 a3=0 items=0 ppid=1 pid=7257 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:51.059000 audit[7257]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff36e18620 a2=3 a3=0 items=0 ppid=1 pid=7257 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:51.059000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:51.422559 kernel: audit: type=1327 audit(1707777111.059:1841): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:51.422591 kernel: audit: type=1105 audit(1707777111.074:1842): pid=7257 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.074000 audit[7257]: USER_START pid=7257 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.517006 kernel: audit: type=1103 audit(1707777111.076:1843): pid=7259 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.076000 audit[7259]: CRED_ACQ pid=7259 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.606196 kernel: audit: type=1106 audit(1707777111.155:1844): pid=7257 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.155000 audit[7257]: USER_END pid=7257 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.701670 kernel: audit: type=1104 audit(1707777111.155:1845): pid=7257 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.155000 audit[7257]: CRED_DISP pid=7257 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:51.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.49.97:22-139.178.68.195:48170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:56.166261 systemd[1]: Started sshd@50-147.75.49.97:22-139.178.68.195:34674.service. Feb 12 22:31:56.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.49.97:22-139.178.68.195:34674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:56.193347 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:31:56.193424 kernel: audit: type=1130 audit(1707777116.165:1847): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.49.97:22-139.178.68.195:34674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:31:56.308000 audit[7284]: USER_ACCT pid=7284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.309546 sshd[7284]: Accepted publickey for core from 139.178.68.195 port 34674 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:31:56.313258 sshd[7284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:31:56.318383 systemd-logind[1464]: New session 33 of user core. Feb 12 22:31:56.318829 systemd[1]: Started session-33.scope. Feb 12 22:31:56.400016 sshd[7284]: pam_unix(sshd:session): session closed for user core Feb 12 22:31:56.311000 audit[7284]: CRED_ACQ pid=7284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.401456 systemd[1]: sshd@50-147.75.49.97:22-139.178.68.195:34674.service: Deactivated successfully. Feb 12 22:31:56.401891 systemd[1]: session-33.scope: Deactivated successfully. Feb 12 22:31:56.402287 systemd-logind[1464]: Session 33 logged out. Waiting for processes to exit. Feb 12 22:31:56.402756 systemd-logind[1464]: Removed session 33. Feb 12 22:31:56.491029 kernel: audit: type=1101 audit(1707777116.308:1848): pid=7284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.491068 kernel: audit: type=1103 audit(1707777116.311:1849): pid=7284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.491086 kernel: audit: type=1006 audit(1707777116.311:1850): pid=7284 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Feb 12 22:31:56.549625 kernel: audit: type=1300 audit(1707777116.311:1850): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3b838930 a2=3 a3=0 items=0 ppid=1 pid=7284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:56.311000 audit[7284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3b838930 a2=3 a3=0 items=0 ppid=1 pid=7284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:31:56.641606 kernel: audit: type=1327 audit(1707777116.311:1850): proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:56.311000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:31:56.672119 kernel: audit: type=1105 audit(1707777116.319:1851): pid=7284 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.319000 audit[7284]: USER_START pid=7284 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.766573 kernel: audit: type=1103 audit(1707777116.320:1852): pid=7286 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.320000 audit[7286]: CRED_ACQ pid=7286 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.399000 audit[7284]: USER_END pid=7284 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.951312 kernel: audit: type=1106 audit(1707777116.399:1853): pid=7284 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.951385 kernel: audit: type=1104 audit(1707777116.399:1854): pid=7284 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.399000 audit[7284]: CRED_DISP pid=7284 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:31:56.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.49.97:22-139.178.68.195:34674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:01.412171 systemd[1]: Started sshd@51-147.75.49.97:22-139.178.68.195:34684.service. Feb 12 22:32:01.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.49.97:22-139.178.68.195:34684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:01.439333 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:32:01.439470 kernel: audit: type=1130 audit(1707777121.411:1856): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.49.97:22-139.178.68.195:34684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:01.553796 sshd[7309]: Accepted publickey for core from 139.178.68.195 port 34684 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:01.552000 audit[7309]: USER_ACCT pid=7309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:01.555240 sshd[7309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:01.557287 systemd-logind[1464]: New session 34 of user core. Feb 12 22:32:01.557992 systemd[1]: Started session-34.scope. Feb 12 22:32:01.637905 sshd[7309]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:01.639376 systemd[1]: sshd@51-147.75.49.97:22-139.178.68.195:34684.service: Deactivated successfully. Feb 12 22:32:01.639859 systemd[1]: session-34.scope: Deactivated successfully. Feb 12 22:32:01.640245 systemd-logind[1464]: Session 34 logged out. Waiting for processes to exit. Feb 12 22:32:01.640756 systemd-logind[1464]: Removed session 34. Feb 12 22:32:01.554000 audit[7309]: CRED_ACQ pid=7309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:01.735735 kernel: audit: type=1101 audit(1707777121.552:1857): pid=7309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:01.735797 kernel: audit: type=1103 audit(1707777121.554:1858): pid=7309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:01.735841 kernel: audit: type=1006 audit(1707777121.554:1859): pid=7309 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Feb 12 22:32:01.554000 audit[7309]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd494aa580 a2=3 a3=0 items=0 ppid=1 pid=7309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:01.886350 kernel: audit: type=1300 audit(1707777121.554:1859): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd494aa580 a2=3 a3=0 items=0 ppid=1 pid=7309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:01.886403 kernel: audit: type=1327 audit(1707777121.554:1859): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:01.554000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:01.559000 audit[7309]: USER_START pid=7309 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:02.011289 kernel: audit: type=1105 audit(1707777121.559:1860): pid=7309 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:02.011357 kernel: audit: type=1103 audit(1707777121.559:1861): pid=7311 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:01.559000 audit[7311]: CRED_ACQ pid=7311 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:01.637000 audit[7309]: USER_END pid=7309 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:02.196154 kernel: audit: type=1106 audit(1707777121.637:1862): pid=7309 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:02.196240 kernel: audit: type=1104 audit(1707777121.637:1863): pid=7309 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:01.637000 audit[7309]: CRED_DISP pid=7309 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:01.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.49.97:22-139.178.68.195:34684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:04.080000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:04.080000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002323f80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:32:04.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:32:04.081000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:04.081000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002697500 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:32:04.081000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:32:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:04.721000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011243aa0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:32:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:32:04.721000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0129ac620 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:32:04.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:32:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c008efccc0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:32:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:32:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c002ea0d80 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:32:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:32:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c008efccf0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:32:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:32:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011243b00 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:32:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:32:06.650878 systemd[1]: Started sshd@52-147.75.49.97:22-139.178.68.195:36954.service. Feb 12 22:32:06.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.49.97:22-139.178.68.195:36954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:06.690876 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 22:32:06.690952 kernel: audit: type=1130 audit(1707777126.650:1873): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.49.97:22-139.178.68.195:36954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:06.804000 audit[7349]: USER_ACCT pid=7349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:06.805228 sshd[7349]: Accepted publickey for core from 139.178.68.195 port 36954 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:06.807658 sshd[7349]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:06.813427 systemd-logind[1464]: New session 35 of user core. Feb 12 22:32:06.815499 systemd[1]: Started session-35.scope. Feb 12 22:32:06.895378 sshd[7349]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:06.806000 audit[7349]: CRED_ACQ pid=7349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:06.896641 systemd[1]: sshd@52-147.75.49.97:22-139.178.68.195:36954.service: Deactivated successfully. Feb 12 22:32:06.897074 systemd[1]: session-35.scope: Deactivated successfully. Feb 12 22:32:06.897462 systemd-logind[1464]: Session 35 logged out. Waiting for processes to exit. Feb 12 22:32:06.897899 systemd-logind[1464]: Removed session 35. Feb 12 22:32:06.987004 kernel: audit: type=1101 audit(1707777126.804:1874): pid=7349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:06.987051 kernel: audit: type=1103 audit(1707777126.806:1875): pid=7349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:06.987088 kernel: audit: type=1006 audit(1707777126.806:1876): pid=7349 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Feb 12 22:32:07.045629 kernel: audit: type=1300 audit(1707777126.806:1876): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeee6e09a0 a2=3 a3=0 items=0 ppid=1 pid=7349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:06.806000 audit[7349]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeee6e09a0 a2=3 a3=0 items=0 ppid=1 pid=7349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:07.137638 kernel: audit: type=1327 audit(1707777126.806:1876): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:06.806000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:07.168140 kernel: audit: type=1105 audit(1707777126.817:1877): pid=7349 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:06.817000 audit[7349]: USER_START pid=7349 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:07.262633 kernel: audit: type=1103 audit(1707777126.818:1878): pid=7351 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:06.818000 audit[7351]: CRED_ACQ pid=7351 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:07.351811 kernel: audit: type=1106 audit(1707777126.894:1879): pid=7349 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:06.894000 audit[7349]: USER_END pid=7349 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:07.447282 kernel: audit: type=1104 audit(1707777126.895:1880): pid=7349 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:06.895000 audit[7349]: CRED_DISP pid=7349 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:06.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.49.97:22-139.178.68.195:36954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:07.464000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:07.464000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013aef20 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:32:07.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:32:07.464000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:07.464000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018ae740 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:32:07.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:32:07.466000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:07.466000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013af0a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:32:07.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:32:07.476000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:32:07.476000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0002f1da0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:32:07.476000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:32:11.905336 systemd[1]: Started sshd@53-147.75.49.97:22-139.178.68.195:36968.service. Feb 12 22:32:11.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.49.97:22-139.178.68.195:36968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:11.932231 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 22:32:11.932297 kernel: audit: type=1130 audit(1707777131.904:1886): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.49.97:22-139.178.68.195:36968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:12.045000 audit[7375]: USER_ACCT pid=7375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.046977 sshd[7375]: Accepted publickey for core from 139.178.68.195 port 36968 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:12.050706 sshd[7375]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:12.054726 systemd-logind[1464]: New session 36 of user core. Feb 12 22:32:12.055436 systemd[1]: Started session-36.scope. Feb 12 22:32:12.049000 audit[7375]: CRED_ACQ pid=7375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.228443 kernel: audit: type=1101 audit(1707777132.045:1887): pid=7375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.228495 kernel: audit: type=1103 audit(1707777132.049:1888): pid=7375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.228514 kernel: audit: type=1006 audit(1707777132.049:1889): pid=7375 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Feb 12 22:32:12.049000 audit[7375]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef99440d0 a2=3 a3=0 items=0 ppid=1 pid=7375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:12.379000 kernel: audit: type=1300 audit(1707777132.049:1889): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef99440d0 a2=3 a3=0 items=0 ppid=1 pid=7375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:12.379074 kernel: audit: type=1327 audit(1707777132.049:1889): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:12.049000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:12.379202 sshd[7375]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:12.380588 systemd[1]: sshd@53-147.75.49.97:22-139.178.68.195:36968.service: Deactivated successfully. Feb 12 22:32:12.381066 systemd[1]: session-36.scope: Deactivated successfully. Feb 12 22:32:12.381405 systemd-logind[1464]: Session 36 logged out. Waiting for processes to exit. Feb 12 22:32:12.381823 systemd-logind[1464]: Removed session 36. Feb 12 22:32:12.409523 kernel: audit: type=1105 audit(1707777132.056:1890): pid=7375 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.056000 audit[7375]: USER_START pid=7375 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.504006 kernel: audit: type=1103 audit(1707777132.057:1891): pid=7377 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.057000 audit[7377]: CRED_ACQ pid=7377 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.593166 kernel: audit: type=1106 audit(1707777132.378:1892): pid=7375 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.378000 audit[7375]: USER_END pid=7375 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.688608 kernel: audit: type=1104 audit(1707777132.378:1893): pid=7375 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.378000 audit[7375]: CRED_DISP pid=7375 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:12.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.49.97:22-139.178.68.195:36968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:17.330940 systemd[1]: Started sshd@54-147.75.49.97:22-139.178.68.195:52896.service. Feb 12 22:32:17.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.49.97:22-139.178.68.195:52896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:17.358073 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:32:17.358204 kernel: audit: type=1130 audit(1707777137.330:1895): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.49.97:22-139.178.68.195:52896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:17.469000 audit[7407]: USER_ACCT pid=7407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:17.470314 sshd[7407]: Accepted publickey for core from 139.178.68.195 port 52896 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:17.473229 sshd[7407]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:17.475631 systemd-logind[1464]: New session 37 of user core. Feb 12 22:32:17.476113 systemd[1]: Started session-37.scope. Feb 12 22:32:17.554611 sshd[7407]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:17.556034 systemd[1]: sshd@54-147.75.49.97:22-139.178.68.195:52896.service: Deactivated successfully. Feb 12 22:32:17.556481 systemd[1]: session-37.scope: Deactivated successfully. Feb 12 22:32:17.556808 systemd-logind[1464]: Session 37 logged out. Waiting for processes to exit. Feb 12 22:32:17.557282 systemd-logind[1464]: Removed session 37. Feb 12 22:32:17.472000 audit[7407]: CRED_ACQ pid=7407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:17.651884 kernel: audit: type=1101 audit(1707777137.469:1896): pid=7407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:17.651942 kernel: audit: type=1103 audit(1707777137.472:1897): pid=7407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:17.651983 kernel: audit: type=1006 audit(1707777137.472:1898): pid=7407 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Feb 12 22:32:17.472000 audit[7407]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec7ea77a0 a2=3 a3=0 items=0 ppid=1 pid=7407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:17.802458 kernel: audit: type=1300 audit(1707777137.472:1898): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec7ea77a0 a2=3 a3=0 items=0 ppid=1 pid=7407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:17.472000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:17.803008 kernel: audit: type=1327 audit(1707777137.472:1898): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:17.477000 audit[7407]: USER_START pid=7407 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:17.927504 kernel: audit: type=1105 audit(1707777137.477:1899): pid=7407 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:17.927538 kernel: audit: type=1103 audit(1707777137.477:1900): pid=7429 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:17.477000 audit[7429]: CRED_ACQ pid=7429 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:18.016706 kernel: audit: type=1106 audit(1707777137.554:1901): pid=7407 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:17.554000 audit[7407]: USER_END pid=7407 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:17.554000 audit[7407]: CRED_DISP pid=7407 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:18.201606 kernel: audit: type=1104 audit(1707777137.554:1902): pid=7407 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:17.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.49.97:22-139.178.68.195:52896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:19.796827 systemd[1]: Started sshd@55-147.75.49.97:22-200.1.219.138:40788.service. Feb 12 22:32:19.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.49.97:22-200.1.219.138:40788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:21.012344 sshd[7453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.1.219.138 user=root Feb 12 22:32:21.011000 audit[7453]: USER_AUTH pid=7453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=200.1.219.138 addr=200.1.219.138 terminal=ssh res=failed' Feb 12 22:32:22.564390 systemd[1]: Started sshd@56-147.75.49.97:22-139.178.68.195:52902.service. Feb 12 22:32:22.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.49.97:22-139.178.68.195:52902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:22.591498 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 12 22:32:22.591532 kernel: audit: type=1130 audit(1707777142.563:1906): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.49.97:22-139.178.68.195:52902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:22.705000 audit[7458]: USER_ACCT pid=7458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:22.706511 sshd[7458]: Accepted publickey for core from 139.178.68.195 port 52902 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:22.708229 sshd[7458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:22.710791 systemd-logind[1464]: New session 38 of user core. Feb 12 22:32:22.711285 systemd[1]: Started session-38.scope. Feb 12 22:32:22.773102 systemd[1]: Started sshd@57-147.75.49.97:22-43.155.157.138:36094.service. Feb 12 22:32:22.707000 audit[7458]: CRED_ACQ pid=7458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:22.797933 kernel: audit: type=1101 audit(1707777142.705:1907): pid=7458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:22.797974 kernel: audit: type=1103 audit(1707777142.707:1908): pid=7458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:22.800490 sshd[7458]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:22.801650 systemd[1]: sshd@56-147.75.49.97:22-139.178.68.195:52902.service: Deactivated successfully. Feb 12 22:32:22.802127 systemd[1]: session-38.scope: Deactivated successfully. Feb 12 22:32:22.802536 systemd-logind[1464]: Session 38 logged out. Waiting for processes to exit. Feb 12 22:32:22.802996 systemd-logind[1464]: Removed session 38. Feb 12 22:32:22.946846 kernel: audit: type=1006 audit(1707777142.707:1909): pid=7458 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Feb 12 22:32:22.946885 kernel: audit: type=1300 audit(1707777142.707:1909): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda913edf0 a2=3 a3=0 items=0 ppid=1 pid=7458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:22.707000 audit[7458]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda913edf0 a2=3 a3=0 items=0 ppid=1 pid=7458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:23.038824 kernel: audit: type=1327 audit(1707777142.707:1909): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:22.707000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:23.069365 kernel: audit: type=1105 audit(1707777142.712:1910): pid=7458 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:22.712000 audit[7458]: USER_START pid=7458 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:23.163848 kernel: audit: type=1103 audit(1707777142.713:1911): pid=7460 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:22.713000 audit[7460]: CRED_ACQ pid=7460 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:23.253088 kernel: audit: type=1130 audit(1707777142.772:1912): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.97:22-43.155.157.138:36094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:22.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.97:22-43.155.157.138:36094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:23.341904 kernel: audit: type=1106 audit(1707777142.800:1913): pid=7458 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:22.800000 audit[7458]: USER_END pid=7458 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:22.800000 audit[7458]: CRED_DISP pid=7458 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:22.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.49.97:22-139.178.68.195:52902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:23.603326 sshd[6774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.140.199.211 user=root Feb 12 22:32:23.602000 audit[6774]: USER_AUTH pid=6774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.140.199.211 addr=43.140.199.211 terminal=ssh res=failed' Feb 12 22:32:23.680217 sshd[7453]: Failed password for root from 200.1.219.138 port 40788 ssh2 Feb 12 22:32:23.716459 sshd[7478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.157.138 user=root Feb 12 22:32:23.715000 audit[7478]: USER_AUTH pid=7478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.157.138 addr=43.155.157.138 terminal=ssh res=failed' Feb 12 22:32:25.033678 sshd[7453]: Received disconnect from 200.1.219.138 port 40788:11: Bye Bye [preauth] Feb 12 22:32:25.033678 sshd[7453]: Disconnected from authenticating user root 200.1.219.138 port 40788 [preauth] Feb 12 22:32:25.036217 systemd[1]: sshd@55-147.75.49.97:22-200.1.219.138:40788.service: Deactivated successfully. Feb 12 22:32:25.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.49.97:22-200.1.219.138:40788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:25.544155 sshd[6774]: Failed password for root from 43.140.199.211 port 36390 ssh2 Feb 12 22:32:25.657290 sshd[7478]: Failed password for root from 43.155.157.138 port 36094 ssh2 Feb 12 22:32:27.402081 sshd[6774]: Received disconnect from 43.140.199.211 port 36390:11: Bye Bye [preauth] Feb 12 22:32:27.402081 sshd[6774]: Disconnected from authenticating user root 43.140.199.211 port 36390 [preauth] Feb 12 22:32:27.404781 systemd[1]: sshd@31-147.75.49.97:22-43.140.199.211:36390.service: Deactivated successfully. Feb 12 22:32:27.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.49.97:22-43.140.199.211:36390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:27.654277 sshd[7478]: Received disconnect from 43.155.157.138 port 36094:11: Bye Bye [preauth] Feb 12 22:32:27.654277 sshd[7478]: Disconnected from authenticating user root 43.155.157.138 port 36094 [preauth] Feb 12 22:32:27.656686 systemd[1]: sshd@57-147.75.49.97:22-43.155.157.138:36094.service: Deactivated successfully. Feb 12 22:32:27.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.97:22-43.155.157.138:36094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:27.684515 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 12 22:32:27.684654 kernel: audit: type=1131 audit(1707777147.656:1920): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.97:22-43.155.157.138:36094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:27.803761 systemd[1]: Started sshd@58-147.75.49.97:22-139.178.68.195:38602.service. Feb 12 22:32:27.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.49.97:22-139.178.68.195:38602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:27.893946 kernel: audit: type=1130 audit(1707777147.802:1921): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.49.97:22-139.178.68.195:38602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:27.918000 audit[7491]: USER_ACCT pid=7491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:27.919235 sshd[7491]: Accepted publickey for core from 139.178.68.195 port 38602 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:27.920323 sshd[7491]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:27.922859 systemd-logind[1464]: New session 39 of user core. Feb 12 22:32:27.923365 systemd[1]: Started session-39.scope. Feb 12 22:32:28.002575 sshd[7491]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:28.004070 systemd[1]: sshd@58-147.75.49.97:22-139.178.68.195:38602.service: Deactivated successfully. Feb 12 22:32:28.004503 systemd[1]: session-39.scope: Deactivated successfully. Feb 12 22:32:28.004810 systemd-logind[1464]: Session 39 logged out. Waiting for processes to exit. Feb 12 22:32:28.005297 systemd-logind[1464]: Removed session 39. Feb 12 22:32:27.919000 audit[7491]: CRED_ACQ pid=7491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:28.103935 kernel: audit: type=1101 audit(1707777147.918:1922): pid=7491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:28.104000 kernel: audit: type=1103 audit(1707777147.919:1923): pid=7491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:28.104047 kernel: audit: type=1006 audit(1707777147.919:1924): pid=7491 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Feb 12 22:32:27.919000 audit[7491]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd3947a30 a2=3 a3=0 items=0 ppid=1 pid=7491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:28.255380 kernel: audit: type=1300 audit(1707777147.919:1924): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd3947a30 a2=3 a3=0 items=0 ppid=1 pid=7491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:28.255440 kernel: audit: type=1327 audit(1707777147.919:1924): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:27.919000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:27.924000 audit[7491]: USER_START pid=7491 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:28.382039 kernel: audit: type=1105 audit(1707777147.924:1925): pid=7491 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:28.382089 kernel: audit: type=1103 audit(1707777147.925:1926): pid=7493 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:27.925000 audit[7493]: CRED_ACQ pid=7493 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:28.002000 audit[7491]: USER_END pid=7491 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:28.568002 kernel: audit: type=1106 audit(1707777148.002:1927): pid=7491 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:28.002000 audit[7491]: CRED_DISP pid=7491 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:28.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.49.97:22-139.178.68.195:38602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:33.005460 systemd[1]: Started sshd@59-147.75.49.97:22-139.178.68.195:38608.service. Feb 12 22:32:33.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.49.97:22-139.178.68.195:38608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:33.032999 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 22:32:33.033103 kernel: audit: type=1130 audit(1707777153.004:1930): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.49.97:22-139.178.68.195:38608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:33.043112 env[1477]: time="2024-02-12T22:32:33.043089067Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:32:33.043885 env[1477]: time="2024-02-12T22:32:33.043868452Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:32:33.045683 env[1477]: time="2024-02-12T22:32:33.045672312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:32:33.047104 env[1477]: time="2024-02-12T22:32:33.047054063Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:32:33.047591 env[1477]: time="2024-02-12T22:32:33.047547836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 22:32:33.048045 env[1477]: time="2024-02-12T22:32:33.047984534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 22:32:33.051662 env[1477]: time="2024-02-12T22:32:33.051584994Z" level=info msg="CreateContainer within sandbox \"36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 22:32:33.058201 sshd[7516]: Accepted publickey for core from 139.178.68.195 port 38608 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:33.059223 sshd[7516]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:33.061641 systemd-logind[1464]: New session 40 of user core. Feb 12 22:32:33.062331 systemd[1]: Started session-40.scope. Feb 12 22:32:33.057000 audit[7516]: USER_ACCT pid=7516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.125064 env[1477]: time="2024-02-12T22:32:33.125009682Z" level=info msg="CreateContainer within sandbox \"36bfd6419adfcaa51ae31e189a67fb34c8e98ea442a7e1d0b8c4443136fa9228\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"54a4db04804fe1ae075a17cf77e92578b1a5ed99d83df795fa47b7ec5ef56905\"" Feb 12 22:32:33.125273 env[1477]: time="2024-02-12T22:32:33.125261552Z" level=info msg="StartContainer for \"54a4db04804fe1ae075a17cf77e92578b1a5ed99d83df795fa47b7ec5ef56905\"" Feb 12 22:32:33.134735 systemd[1]: Started cri-containerd-54a4db04804fe1ae075a17cf77e92578b1a5ed99d83df795fa47b7ec5ef56905.scope. Feb 12 22:32:33.148138 sshd[7516]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:33.149508 systemd[1]: sshd@59-147.75.49.97:22-139.178.68.195:38608.service: Deactivated successfully. Feb 12 22:32:33.150004 systemd[1]: session-40.scope: Deactivated successfully. Feb 12 22:32:33.150387 systemd-logind[1464]: Session 40 logged out. Waiting for processes to exit. Feb 12 22:32:33.150820 systemd-logind[1464]: Removed session 40. Feb 12 22:32:33.215454 kernel: audit: type=1101 audit(1707777153.057:1931): pid=7516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.215493 kernel: audit: type=1103 audit(1707777153.058:1932): pid=7516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.058000 audit[7516]: CRED_ACQ pid=7516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.307929 kernel: audit: type=1006 audit(1707777153.058:1933): pid=7516 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Feb 12 22:32:33.058000 audit[7516]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff96059c80 a2=3 a3=0 items=0 ppid=1 pid=7516 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:33.366975 kernel: audit: type=1300 audit(1707777153.058:1933): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff96059c80 a2=3 a3=0 items=0 ppid=1 pid=7516 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:33.058000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:33.490193 kernel: audit: type=1327 audit(1707777153.058:1933): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:33.490222 kernel: audit: type=1105 audit(1707777153.063:1934): pid=7516 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.063000 audit[7516]: USER_START pid=7516 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.585817 kernel: audit: type=1103 audit(1707777153.064:1935): pid=7522 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.064000 audit[7522]: CRED_ACQ pid=7522 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.675591 kernel: audit: type=1106 audit(1707777153.147:1936): pid=7516 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.147000 audit[7516]: USER_END pid=7516 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.771580 kernel: audit: type=1104 audit(1707777153.147:1937): pid=7516 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.147000 audit[7516]: CRED_DISP pid=7516 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:33.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.49.97:22-139.178.68.195:38608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:33.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit: BPF prog-id=179 op=LOAD Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5271 pid=7547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:33.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534613464623034383034666531616530373561313763663737653932 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=5271 pid=7547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:33.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534613464623034383034666531616530373561313763663737653932 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.306000 audit: BPF prog-id=180 op=LOAD Feb 12 22:32:33.306000 audit[7547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000289870 items=0 ppid=5271 pid=7547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:33.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534613464623034383034666531616530373561313763663737653932 Feb 12 22:32:33.458000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.458000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.458000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.458000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.458000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.458000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.458000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.458000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.458000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.458000 audit: BPF prog-id=181 op=LOAD Feb 12 22:32:33.458000 audit[7547]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002898b8 items=0 ppid=5271 pid=7547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:33.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534613464623034383034666531616530373561313763663737653932 Feb 12 22:32:33.584000 audit: BPF prog-id=181 op=UNLOAD Feb 12 22:32:33.584000 audit: BPF prog-id=180 op=UNLOAD Feb 12 22:32:33.584000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.584000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.584000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.584000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.584000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.584000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.584000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.584000 audit[7547]: AVC avc: denied { perfmon } for pid=7547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.584000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.584000 audit[7547]: AVC avc: denied { bpf } for pid=7547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:33.584000 audit: BPF prog-id=182 op=LOAD Feb 12 22:32:33.584000 audit[7547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000289cc8 items=0 ppid=5271 pid=7547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:33.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534613464623034383034666531616530373561313763663737653932 Feb 12 22:32:33.878207 env[1477]: time="2024-02-12T22:32:33.878180375Z" level=info msg="StartContainer for \"54a4db04804fe1ae075a17cf77e92578b1a5ed99d83df795fa47b7ec5ef56905\" returns successfully" Feb 12 22:32:34.052483 kubelet[2597]: I0212 22:32:34.052439 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5588694d89-69h2v" podStartSLOduration=-9.223370648802404e+09 pod.CreationTimestamp="2024-02-12 22:09:26 +0000 UTC" firstStartedPulling="2024-02-12 22:19:38.601335889 +0000 UTC m=+630.457361553" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:32:34.051031196 +0000 UTC m=+1405.907056899" watchObservedRunningTime="2024-02-12 22:32:34.052371539 +0000 UTC m=+1405.908397222" Feb 12 22:32:35.886848 kubelet[2597]: I0212 22:32:35.886815 2597 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:32:35.891658 systemd[1]: Created slice kubepods-besteffort-pod50d93712_9a2f_4d45_ad67_d9e6ac4ecfc9.slice. Feb 12 22:32:35.905000 audit[7637]: NETFILTER_CFG table=filter:123 family=2 entries=7 op=nft_register_rule pid=7637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:32:35.905000 audit[7637]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffec87219e0 a2=0 a3=7ffec87219cc items=0 ppid=2903 pid=7637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:35.905000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:32:35.906000 audit[7637]: NETFILTER_CFG table=nat:124 family=2 entries=78 op=nft_register_rule pid=7637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:32:35.906000 audit[7637]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffec87219e0 a2=0 a3=7ffec87219cc items=0 ppid=2903 pid=7637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:35.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:32:35.941086 systemd[1]: Started sshd@60-147.75.49.97:22-137.220.228.67:44602.service. Feb 12 22:32:35.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.49.97:22-137.220.228.67:44602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:35.942000 audit[7665]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=7665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:32:35.942000 audit[7665]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe2fb70ec0 a2=0 a3=7ffe2fb70eac items=0 ppid=2903 pid=7665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:35.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:32:35.943000 audit[7665]: NETFILTER_CFG table=nat:126 family=2 entries=78 op=nft_register_rule pid=7665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:32:35.943000 audit[7665]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe2fb70ec0 a2=0 a3=7ffe2fb70eac items=0 ppid=2903 pid=7665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:35.943000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:32:36.038897 kubelet[2597]: I0212 22:32:36.038835 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9-calico-apiserver-certs\") pod \"calico-apiserver-6ff4559b74-7g5df\" (UID: \"50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9\") " pod="calico-apiserver/calico-apiserver-6ff4559b74-7g5df" Feb 12 22:32:36.039172 kubelet[2597]: I0212 22:32:36.039087 2597 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cvp8q\" (UniqueName: \"kubernetes.io/projected/50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9-kube-api-access-cvp8q\") pod \"calico-apiserver-6ff4559b74-7g5df\" (UID: \"50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9\") " pod="calico-apiserver/calico-apiserver-6ff4559b74-7g5df" Feb 12 22:32:36.140454 kubelet[2597]: E0212 22:32:36.140252 2597 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 22:32:36.140454 kubelet[2597]: E0212 22:32:36.140455 2597 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9-calico-apiserver-certs podName:50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9 nodeName:}" failed. No retries permitted until 2024-02-12 22:32:36.640408542 +0000 UTC m=+1408.496434240 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9-calico-apiserver-certs") pod "calico-apiserver-6ff4559b74-7g5df" (UID: "50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9") : secret "calico-apiserver-certs" not found Feb 12 22:32:36.591826 sshd[7664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.220.228.67 user=root Feb 12 22:32:36.591000 audit[7664]: USER_AUTH pid=7664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=137.220.228.67 addr=137.220.228.67 terminal=ssh res=failed' Feb 12 22:32:36.644167 kubelet[2597]: E0212 22:32:36.644108 2597 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 22:32:36.644481 kubelet[2597]: E0212 22:32:36.644247 2597 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9-calico-apiserver-certs podName:50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9 nodeName:}" failed. No retries permitted until 2024-02-12 22:32:37.644210049 +0000 UTC m=+1409.500235752 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9-calico-apiserver-certs") pod "calico-apiserver-6ff4559b74-7g5df" (UID: "50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9") : secret "calico-apiserver-certs" not found Feb 12 22:32:37.694731 env[1477]: time="2024-02-12T22:32:37.694596236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6ff4559b74-7g5df,Uid:50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9,Namespace:calico-apiserver,Attempt:0,}" Feb 12 22:32:37.834862 systemd-networkd[1314]: cali80e8b652563: Link UP Feb 12 22:32:37.890865 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:32:37.890952 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali80e8b652563: link becomes ready Feb 12 22:32:37.890988 systemd-networkd[1314]: cali80e8b652563: Gained carrier Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.763 [INFO][7670] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0 calico-apiserver-6ff4559b74- calico-apiserver 50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9 3424 0 2024-02-12 22:32:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6ff4559b74 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-0de130baf6 calico-apiserver-6ff4559b74-7g5df eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali80e8b652563 [] []}} ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Namespace="calico-apiserver" Pod="calico-apiserver-6ff4559b74-7g5df" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.763 [INFO][7670] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Namespace="calico-apiserver" Pod="calico-apiserver-6ff4559b74-7g5df" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.800 [INFO][7693] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" HandleID="k8s-pod-network.28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.809 [INFO][7693] ipam_plugin.go 268: Auto assigning IP ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" HandleID="k8s-pod-network.28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e8fd0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-0de130baf6", "pod":"calico-apiserver-6ff4559b74-7g5df", "timestamp":"2024-02-12 22:32:37.800067488 +0000 UTC"}, Hostname:"ci-3510.3.2-a-0de130baf6", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.809 [INFO][7693] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.809 [INFO][7693] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.809 [INFO][7693] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-0de130baf6' Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.810 [INFO][7693] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.814 [INFO][7693] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-0de130baf6" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.818 [INFO][7693] ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.820 [INFO][7693] ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.822 [INFO][7693] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.2-a-0de130baf6" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.822 [INFO][7693] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.824 [INFO][7693] ipam.go 1682: Creating new handle: k8s-pod-network.28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102 Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.827 [INFO][7693] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.832 [INFO][7693] ipam.go 1216: Successfully claimed IPs: [192.168.64.69/26] block=192.168.64.64/26 handle="k8s-pod-network.28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.832 [INFO][7693] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.69/26] handle="k8s-pod-network.28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" host="ci-3510.3.2-a-0de130baf6" Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.832 [INFO][7693] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:32:37.895712 env[1477]: 2024-02-12 22:32:37.832 [INFO][7693] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.69/26] IPv6=[] ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" HandleID="k8s-pod-network.28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Workload="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0" Feb 12 22:32:37.896180 env[1477]: 2024-02-12 22:32:37.833 [INFO][7670] k8s.go 385: Populated endpoint ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Namespace="calico-apiserver" Pod="calico-apiserver-6ff4559b74-7g5df" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0", GenerateName:"calico-apiserver-6ff4559b74-", Namespace:"calico-apiserver", SelfLink:"", UID:"50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9", ResourceVersion:"3424", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 32, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6ff4559b74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"", Pod:"calico-apiserver-6ff4559b74-7g5df", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali80e8b652563", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:32:37.896180 env[1477]: 2024-02-12 22:32:37.833 [INFO][7670] k8s.go 386: Calico CNI using IPs: [192.168.64.69/32] ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Namespace="calico-apiserver" Pod="calico-apiserver-6ff4559b74-7g5df" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0" Feb 12 22:32:37.896180 env[1477]: 2024-02-12 22:32:37.833 [INFO][7670] dataplane_linux.go 68: Setting the host side veth name to cali80e8b652563 ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Namespace="calico-apiserver" Pod="calico-apiserver-6ff4559b74-7g5df" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0" Feb 12 22:32:37.896180 env[1477]: 2024-02-12 22:32:37.891 [INFO][7670] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Namespace="calico-apiserver" Pod="calico-apiserver-6ff4559b74-7g5df" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0" Feb 12 22:32:37.896180 env[1477]: 2024-02-12 22:32:37.891 [INFO][7670] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Namespace="calico-apiserver" Pod="calico-apiserver-6ff4559b74-7g5df" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0", GenerateName:"calico-apiserver-6ff4559b74-", Namespace:"calico-apiserver", SelfLink:"", UID:"50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9", ResourceVersion:"3424", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 32, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6ff4559b74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0de130baf6", ContainerID:"28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102", Pod:"calico-apiserver-6ff4559b74-7g5df", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali80e8b652563", MAC:"de:cf:81:6f:b4:c5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:32:37.896180 env[1477]: 2024-02-12 22:32:37.894 [INFO][7670] k8s.go 491: Wrote updated endpoint to datastore ContainerID="28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102" Namespace="calico-apiserver" Pod="calico-apiserver-6ff4559b74-7g5df" WorkloadEndpoint="ci--3510.3.2--a--0de130baf6-k8s-calico--apiserver--6ff4559b74--7g5df-eth0" Feb 12 22:32:37.901604 env[1477]: time="2024-02-12T22:32:37.901540409Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:32:37.901604 env[1477]: time="2024-02-12T22:32:37.901564834Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:32:37.901604 env[1477]: time="2024-02-12T22:32:37.901572098Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:32:37.901711 env[1477]: time="2024-02-12T22:32:37.901634717Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102 pid=7739 runtime=io.containerd.runc.v2 Feb 12 22:32:37.903000 audit[7749]: NETFILTER_CFG table=filter:127 family=2 entries=55 op=nft_register_chain pid=7749 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:32:37.903000 audit[7749]: SYSCALL arch=c000003e syscall=46 success=yes exit=28088 a0=3 a1=7ffe8d1757b0 a2=0 a3=7ffe8d17579c items=0 ppid=4299 pid=7749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:37.903000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:32:37.908456 systemd[1]: Started cri-containerd-28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102.scope. Feb 12 22:32:37.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit: BPF prog-id=183 op=LOAD Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=7739 pid=7748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:37.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238626633613931323631643965623236633163633063663039623962 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=7739 pid=7748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:37.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238626633613931323631643965623236633163633063663039623962 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit: BPF prog-id=184 op=LOAD Feb 12 22:32:37.912000 audit[7748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000188750 items=0 ppid=7739 pid=7748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:37.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238626633613931323631643965623236633163633063663039623962 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.912000 audit: BPF prog-id=185 op=LOAD Feb 12 22:32:37.912000 audit[7748]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000188798 items=0 ppid=7739 pid=7748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:37.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238626633613931323631643965623236633163633063663039623962 Feb 12 22:32:37.913000 audit: BPF prog-id=185 op=UNLOAD Feb 12 22:32:37.913000 audit: BPF prog-id=184 op=UNLOAD Feb 12 22:32:37.913000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.913000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.913000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.913000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.913000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.913000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.913000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.913000 audit[7748]: AVC avc: denied { perfmon } for pid=7748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.913000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.913000 audit[7748]: AVC avc: denied { bpf } for pid=7748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:32:37.913000 audit: BPF prog-id=186 op=LOAD Feb 12 22:32:37.913000 audit[7748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000188ba8 items=0 ppid=7739 pid=7748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:37.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238626633613931323631643965623236633163633063663039623962 Feb 12 22:32:37.929832 env[1477]: time="2024-02-12T22:32:37.929807325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6ff4559b74-7g5df,Uid:50d93712-9a2f-4d45-ad67-d9e6ac4ecfc9,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102\"" Feb 12 22:32:38.159297 systemd[1]: Started sshd@61-147.75.49.97:22-139.178.68.195:38004.service. Feb 12 22:32:38.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.49.97:22-139.178.68.195:38004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:38.200101 kernel: kauditd_printk_skb: 132 callbacks suppressed Feb 12 22:32:38.200233 kernel: audit: type=1130 audit(1707777158.158:1982): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.49.97:22-139.178.68.195:38004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:38.312000 audit[7774]: USER_ACCT pid=7774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.313861 sshd[7774]: Accepted publickey for core from 139.178.68.195 port 38004 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:38.315740 sshd[7774]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:38.316154 sshd[7664]: Failed password for root from 137.220.228.67 port 44602 ssh2 Feb 12 22:32:38.321779 systemd-logind[1464]: New session 41 of user core. Feb 12 22:32:38.323251 systemd[1]: Started session-41.scope. Feb 12 22:32:38.314000 audit[7774]: CRED_ACQ pid=7774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.409030 sshd[7774]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:38.410522 systemd[1]: sshd@61-147.75.49.97:22-139.178.68.195:38004.service: Deactivated successfully. Feb 12 22:32:38.410962 systemd[1]: session-41.scope: Deactivated successfully. Feb 12 22:32:38.411370 systemd-logind[1464]: Session 41 logged out. Waiting for processes to exit. Feb 12 22:32:38.411844 systemd-logind[1464]: Removed session 41. Feb 12 22:32:38.493516 kernel: audit: type=1101 audit(1707777158.312:1983): pid=7774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.493604 kernel: audit: type=1103 audit(1707777158.314:1984): pid=7774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.493643 kernel: audit: type=1006 audit(1707777158.314:1985): pid=7774 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=41 res=1 Feb 12 22:32:38.314000 audit[7774]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9bb8d4f0 a2=3 a3=0 items=0 ppid=1 pid=7774 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:38.592872 sshd[7664]: Received disconnect from 137.220.228.67 port 44602:11: Bye Bye [preauth] Feb 12 22:32:38.592872 sshd[7664]: Disconnected from authenticating user root 137.220.228.67 port 44602 [preauth] Feb 12 22:32:38.593513 systemd[1]: sshd@60-147.75.49.97:22-137.220.228.67:44602.service: Deactivated successfully. Feb 12 22:32:38.642820 kernel: audit: type=1300 audit(1707777158.314:1985): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9bb8d4f0 a2=3 a3=0 items=0 ppid=1 pid=7774 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:38.642899 kernel: audit: type=1327 audit(1707777158.314:1985): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:38.314000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:38.328000 audit[7774]: USER_START pid=7774 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.767005 kernel: audit: type=1105 audit(1707777158.328:1986): pid=7774 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.767065 kernel: audit: type=1103 audit(1707777158.330:1987): pid=7776 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.330000 audit[7776]: CRED_ACQ pid=7776 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.408000 audit[7774]: USER_END pid=7774 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.949120 kernel: audit: type=1106 audit(1707777158.408:1988): pid=7774 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.949192 kernel: audit: type=1104 audit(1707777158.408:1989): pid=7774 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.408000 audit[7774]: CRED_DISP pid=7774 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:38.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.49.97:22-139.178.68.195:38004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:38.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.49.97:22-137.220.228.67:44602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:39.342215 systemd-networkd[1314]: cali80e8b652563: Gained IPv6LL Feb 12 22:32:43.421085 systemd[1]: Started sshd@62-147.75.49.97:22-139.178.68.195:38010.service. Feb 12 22:32:43.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.49.97:22-139.178.68.195:38010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:43.448095 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 22:32:43.448276 kernel: audit: type=1130 audit(1707777163.420:1992): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.49.97:22-139.178.68.195:38010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:43.559000 audit[7822]: USER_ACCT pid=7822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:43.560473 sshd[7822]: Accepted publickey for core from 139.178.68.195 port 38010 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:43.562711 sshd[7822]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:43.568597 systemd-logind[1464]: New session 42 of user core. Feb 12 22:32:43.570165 systemd[1]: Started session-42.scope. Feb 12 22:32:43.561000 audit[7822]: CRED_ACQ pid=7822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:43.657244 sshd[7822]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:43.658638 systemd[1]: sshd@62-147.75.49.97:22-139.178.68.195:38010.service: Deactivated successfully. Feb 12 22:32:43.659081 systemd[1]: session-42.scope: Deactivated successfully. Feb 12 22:32:43.659505 systemd-logind[1464]: Session 42 logged out. Waiting for processes to exit. Feb 12 22:32:43.659932 systemd-logind[1464]: Removed session 42. Feb 12 22:32:43.739843 kernel: audit: type=1101 audit(1707777163.559:1993): pid=7822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:43.739901 kernel: audit: type=1103 audit(1707777163.561:1994): pid=7822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:43.739968 kernel: audit: type=1006 audit(1707777163.561:1995): pid=7822 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=42 res=1 Feb 12 22:32:43.561000 audit[7822]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcee5076c0 a2=3 a3=0 items=0 ppid=1 pid=7822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:43.797928 kernel: audit: type=1300 audit(1707777163.561:1995): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcee5076c0 a2=3 a3=0 items=0 ppid=1 pid=7822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:43.561000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:43.918400 kernel: audit: type=1327 audit(1707777163.561:1995): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:43.918479 kernel: audit: type=1105 audit(1707777163.575:1996): pid=7822 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:43.575000 audit[7822]: USER_START pid=7822 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:43.576000 audit[7824]: CRED_ACQ pid=7824 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:44.101593 kernel: audit: type=1103 audit(1707777163.576:1997): pid=7824 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:44.101640 kernel: audit: type=1106 audit(1707777163.656:1998): pid=7822 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:43.656000 audit[7822]: USER_END pid=7822 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:44.197128 kernel: audit: type=1104 audit(1707777163.657:1999): pid=7822 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:43.657000 audit[7822]: CRED_DISP pid=7822 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:43.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.49.97:22-139.178.68.195:38010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:48.667465 systemd[1]: Started sshd@63-147.75.49.97:22-139.178.68.195:56796.service. Feb 12 22:32:48.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.49.97:22-139.178.68.195:56796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:48.694696 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:32:48.694751 kernel: audit: type=1130 audit(1707777168.666:2001): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.49.97:22-139.178.68.195:56796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:48.808000 audit[7876]: USER_ACCT pid=7876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:48.809544 sshd[7876]: Accepted publickey for core from 139.178.68.195 port 56796 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:48.810244 sshd[7876]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:48.812812 systemd-logind[1464]: New session 43 of user core. Feb 12 22:32:48.813232 systemd[1]: Started session-43.scope. Feb 12 22:32:48.896002 sshd[7876]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:48.897393 systemd[1]: sshd@63-147.75.49.97:22-139.178.68.195:56796.service: Deactivated successfully. Feb 12 22:32:48.897843 systemd[1]: session-43.scope: Deactivated successfully. Feb 12 22:32:48.898212 systemd-logind[1464]: Session 43 logged out. Waiting for processes to exit. Feb 12 22:32:48.898670 systemd-logind[1464]: Removed session 43. Feb 12 22:32:48.809000 audit[7876]: CRED_ACQ pid=7876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:48.991472 kernel: audit: type=1101 audit(1707777168.808:2002): pid=7876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:48.991519 kernel: audit: type=1103 audit(1707777168.809:2003): pid=7876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:48.991537 kernel: audit: type=1006 audit(1707777168.809:2004): pid=7876 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=43 res=1 Feb 12 22:32:49.050058 kernel: audit: type=1300 audit(1707777168.809:2004): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbe5eade0 a2=3 a3=0 items=0 ppid=1 pid=7876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:48.809000 audit[7876]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbe5eade0 a2=3 a3=0 items=0 ppid=1 pid=7876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:49.142058 kernel: audit: type=1327 audit(1707777168.809:2004): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:48.809000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:49.172596 kernel: audit: type=1105 audit(1707777168.814:2005): pid=7876 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:48.814000 audit[7876]: USER_START pid=7876 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:49.267124 kernel: audit: type=1103 audit(1707777168.815:2006): pid=7878 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:48.815000 audit[7878]: CRED_ACQ pid=7878 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:49.356433 kernel: audit: type=1106 audit(1707777168.895:2007): pid=7876 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:48.895000 audit[7876]: USER_END pid=7876 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:49.451930 kernel: audit: type=1104 audit(1707777168.895:2008): pid=7876 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:48.895000 audit[7876]: CRED_DISP pid=7876 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:48.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.49.97:22-139.178.68.195:56796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:53.905832 systemd[1]: Started sshd@64-147.75.49.97:22-139.178.68.195:56806.service. Feb 12 22:32:53.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.49.97:22-139.178.68.195:56806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:53.933129 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:32:53.933233 kernel: audit: type=1130 audit(1707777173.905:2010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.49.97:22-139.178.68.195:56806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:54.046000 audit[7902]: USER_ACCT pid=7902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.047216 sshd[7902]: Accepted publickey for core from 139.178.68.195 port 56806 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:54.048527 sshd[7902]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:54.051097 systemd-logind[1464]: New session 44 of user core. Feb 12 22:32:54.051629 systemd[1]: Started session-44.scope. Feb 12 22:32:54.129110 sshd[7902]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:54.130374 systemd[1]: sshd@64-147.75.49.97:22-139.178.68.195:56806.service: Deactivated successfully. Feb 12 22:32:54.130842 systemd[1]: session-44.scope: Deactivated successfully. Feb 12 22:32:54.131217 systemd-logind[1464]: Session 44 logged out. Waiting for processes to exit. Feb 12 22:32:54.131643 systemd-logind[1464]: Removed session 44. Feb 12 22:32:54.047000 audit[7902]: CRED_ACQ pid=7902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.228875 kernel: audit: type=1101 audit(1707777174.046:2011): pid=7902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.228915 kernel: audit: type=1103 audit(1707777174.047:2012): pid=7902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.228936 kernel: audit: type=1006 audit(1707777174.047:2013): pid=7902 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=44 res=1 Feb 12 22:32:54.287434 kernel: audit: type=1300 audit(1707777174.047:2013): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe448e8ba0 a2=3 a3=0 items=0 ppid=1 pid=7902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:54.047000 audit[7902]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe448e8ba0 a2=3 a3=0 items=0 ppid=1 pid=7902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:54.379431 kernel: audit: type=1327 audit(1707777174.047:2013): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:54.047000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:54.409924 kernel: audit: type=1105 audit(1707777174.052:2014): pid=7902 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.052000 audit[7902]: USER_START pid=7902 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.504402 kernel: audit: type=1103 audit(1707777174.053:2015): pid=7904 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.053000 audit[7904]: CRED_ACQ pid=7904 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.128000 audit[7902]: USER_END pid=7902 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.689082 kernel: audit: type=1106 audit(1707777174.128:2016): pid=7902 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.689116 kernel: audit: type=1104 audit(1707777174.128:2017): pid=7902 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.128000 audit[7902]: CRED_DISP pid=7902 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:54.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.49.97:22-139.178.68.195:56806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:59.141063 systemd[1]: Started sshd@65-147.75.49.97:22-139.178.68.195:58126.service. Feb 12 22:32:59.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.49.97:22-139.178.68.195:58126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:59.168693 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:32:59.168767 kernel: audit: type=1130 audit(1707777179.140:2019): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.49.97:22-139.178.68.195:58126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:32:59.281000 audit[7930]: USER_ACCT pid=7930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.283006 sshd[7930]: Accepted publickey for core from 139.178.68.195 port 58126 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:32:59.284216 sshd[7930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:32:59.286917 systemd-logind[1464]: New session 45 of user core. Feb 12 22:32:59.288007 systemd[1]: Started session-45.scope. Feb 12 22:32:59.366617 sshd[7930]: pam_unix(sshd:session): session closed for user core Feb 12 22:32:59.368551 systemd[1]: sshd@65-147.75.49.97:22-139.178.68.195:58126.service: Deactivated successfully. Feb 12 22:32:59.369075 systemd[1]: session-45.scope: Deactivated successfully. Feb 12 22:32:59.369417 systemd-logind[1464]: Session 45 logged out. Waiting for processes to exit. Feb 12 22:32:59.369810 systemd-logind[1464]: Removed session 45. Feb 12 22:32:59.283000 audit[7930]: CRED_ACQ pid=7930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.464829 kernel: audit: type=1101 audit(1707777179.281:2020): pid=7930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.464865 kernel: audit: type=1103 audit(1707777179.283:2021): pid=7930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.464881 kernel: audit: type=1006 audit(1707777179.283:2022): pid=7930 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=45 res=1 Feb 12 22:32:59.523389 kernel: audit: type=1300 audit(1707777179.283:2022): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8d644500 a2=3 a3=0 items=0 ppid=1 pid=7930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:59.283000 audit[7930]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8d644500 a2=3 a3=0 items=0 ppid=1 pid=7930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:32:59.615369 kernel: audit: type=1327 audit(1707777179.283:2022): proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:59.283000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:32:59.645854 kernel: audit: type=1105 audit(1707777179.289:2023): pid=7930 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.289000 audit[7930]: USER_START pid=7930 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.740349 kernel: audit: type=1103 audit(1707777179.290:2024): pid=7932 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.290000 audit[7932]: CRED_ACQ pid=7932 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.366000 audit[7930]: USER_END pid=7930 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.925279 kernel: audit: type=1106 audit(1707777179.366:2025): pid=7930 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.925351 kernel: audit: type=1104 audit(1707777179.366:2026): pid=7930 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.366000 audit[7930]: CRED_DISP pid=7930 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:32:59.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.49.97:22-139.178.68.195:58126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:04.082000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:04.082000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0023d3110 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:33:04.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:33:04.082000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:04.082000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000086da0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:33:04.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:33:04.374526 systemd[1]: Started sshd@66-147.75.49.97:22-139.178.68.195:58140.service. Feb 12 22:33:04.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.49.97:22-139.178.68.195:58140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:04.412471 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 22:33:04.412590 kernel: audit: type=1130 audit(1707777184.373:2030): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.49.97:22-139.178.68.195:58140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:04.524000 audit[7956]: USER_ACCT pid=7956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:04.525473 sshd[7956]: Accepted publickey for core from 139.178.68.195 port 58140 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:04.526886 sshd[7956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:04.529743 systemd-logind[1464]: New session 46 of user core. Feb 12 22:33:04.530794 systemd[1]: Started session-46.scope. Feb 12 22:33:04.610052 sshd[7956]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:04.611796 systemd[1]: sshd@66-147.75.49.97:22-139.178.68.195:58140.service: Deactivated successfully. Feb 12 22:33:04.612592 systemd[1]: session-46.scope: Deactivated successfully. Feb 12 22:33:04.613140 systemd-logind[1464]: Session 46 logged out. Waiting for processes to exit. Feb 12 22:33:04.613629 systemd-logind[1464]: Removed session 46. Feb 12 22:33:04.525000 audit[7956]: CRED_ACQ pid=7956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:04.707230 kernel: audit: type=1101 audit(1707777184.524:2031): pid=7956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:04.707267 kernel: audit: type=1103 audit(1707777184.525:2032): pid=7956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:04.707303 kernel: audit: type=1006 audit(1707777184.525:2033): pid=7956 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=46 res=1 Feb 12 22:33:04.765831 kernel: audit: type=1300 audit(1707777184.525:2033): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c5acb70 a2=3 a3=0 items=0 ppid=1 pid=7956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:04.525000 audit[7956]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c5acb70 a2=3 a3=0 items=0 ppid=1 pid=7956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:04.525000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:04.888325 kernel: audit: type=1327 audit(1707777184.525:2033): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:04.888356 kernel: audit: type=1105 audit(1707777184.532:2034): pid=7956 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:04.532000 audit[7956]: USER_START pid=7956 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:04.532000 audit[7958]: CRED_ACQ pid=7958 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:05.072233 kernel: audit: type=1103 audit(1707777184.532:2035): pid=7958 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:05.072308 kernel: audit: type=1106 audit(1707777184.609:2036): pid=7956 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:04.609000 audit[7956]: USER_END pid=7956 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:04.609000 audit[7956]: CRED_DISP pid=7956 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:05.257187 kernel: audit: type=1104 audit(1707777184.609:2037): pid=7956 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:04.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.49.97:22-139.178.68.195:58140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c009348510 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:33:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:33:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c009ef7e30 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:33:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:33:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0128e69c0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:33:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:33:04.722000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:04.722000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00a825a40 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:33:04.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:33:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00adfea80 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:33:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:33:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c012952b80 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:33:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:33:07.464000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:07.464000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b9740 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:33:07.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:33:07.466000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:07.466000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011b9760 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:33:07.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:33:07.466000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:07.466000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0011b97c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:33:07.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:33:07.477000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:33:07.477000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e8f360 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:33:07.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:33:09.620144 systemd[1]: Started sshd@67-147.75.49.97:22-139.178.68.195:50218.service. Feb 12 22:33:09.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.49.97:22-139.178.68.195:50218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:09.647158 kernel: kauditd_printk_skb: 31 callbacks suppressed Feb 12 22:33:09.647219 kernel: audit: type=1130 audit(1707777189.619:2049): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.49.97:22-139.178.68.195:50218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:09.760000 audit[7987]: USER_ACCT pid=7987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:09.761194 sshd[7987]: Accepted publickey for core from 139.178.68.195 port 50218 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:09.762536 sshd[7987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:09.764965 systemd-logind[1464]: New session 47 of user core. Feb 12 22:33:09.765566 systemd[1]: Started session-47.scope. Feb 12 22:33:09.846979 sshd[7987]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:09.848385 systemd[1]: sshd@67-147.75.49.97:22-139.178.68.195:50218.service: Deactivated successfully. Feb 12 22:33:09.848917 systemd[1]: session-47.scope: Deactivated successfully. Feb 12 22:33:09.849403 systemd-logind[1464]: Session 47 logged out. Waiting for processes to exit. Feb 12 22:33:09.849886 systemd-logind[1464]: Removed session 47. Feb 12 22:33:09.761000 audit[7987]: CRED_ACQ pid=7987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:09.945162 kernel: audit: type=1101 audit(1707777189.760:2050): pid=7987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:09.945203 kernel: audit: type=1103 audit(1707777189.761:2051): pid=7987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:09.945223 kernel: audit: type=1006 audit(1707777189.761:2052): pid=7987 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=47 res=1 Feb 12 22:33:09.761000 audit[7987]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5bfefce0 a2=3 a3=0 items=0 ppid=1 pid=7987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:10.095887 kernel: audit: type=1300 audit(1707777189.761:2052): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5bfefce0 a2=3 a3=0 items=0 ppid=1 pid=7987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:10.095925 kernel: audit: type=1327 audit(1707777189.761:2052): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:09.761000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:10.126391 kernel: audit: type=1105 audit(1707777189.767:2053): pid=7987 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:09.767000 audit[7987]: USER_START pid=7987 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:10.220872 kernel: audit: type=1103 audit(1707777189.767:2054): pid=7989 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:09.767000 audit[7989]: CRED_ACQ pid=7989 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:10.310048 kernel: audit: type=1106 audit(1707777189.846:2055): pid=7987 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:09.846000 audit[7987]: USER_END pid=7987 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:10.405549 kernel: audit: type=1104 audit(1707777189.846:2056): pid=7987 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:09.846000 audit[7987]: CRED_DISP pid=7987 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:09.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.49.97:22-139.178.68.195:50218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:14.856732 systemd[1]: Started sshd@68-147.75.49.97:22-139.178.68.195:50226.service. Feb 12 22:33:14.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.49.97:22-139.178.68.195:50226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:14.883892 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:33:14.883976 kernel: audit: type=1130 audit(1707777194.855:2058): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.49.97:22-139.178.68.195:50226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:14.997000 audit[8051]: USER_ACCT pid=8051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:14.998583 sshd[8051]: Accepted publickey for core from 139.178.68.195 port 50226 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:15.000220 sshd[8051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:15.002526 systemd-logind[1464]: New session 48 of user core. Feb 12 22:33:15.002967 systemd[1]: Started session-48.scope. Feb 12 22:33:15.087736 sshd[8051]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:15.089091 systemd[1]: sshd@68-147.75.49.97:22-139.178.68.195:50226.service: Deactivated successfully. Feb 12 22:33:15.089533 systemd[1]: session-48.scope: Deactivated successfully. Feb 12 22:33:14.999000 audit[8051]: CRED_ACQ pid=8051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.089883 systemd-logind[1464]: Session 48 logged out. Waiting for processes to exit. Feb 12 22:33:15.090515 systemd-logind[1464]: Removed session 48. Feb 12 22:33:15.180241 kernel: audit: type=1101 audit(1707777194.997:2059): pid=8051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.180287 kernel: audit: type=1103 audit(1707777194.999:2060): pid=8051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.180305 kernel: audit: type=1006 audit(1707777194.999:2061): pid=8051 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=48 res=1 Feb 12 22:33:15.238770 kernel: audit: type=1300 audit(1707777194.999:2061): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefef79560 a2=3 a3=0 items=0 ppid=1 pid=8051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:14.999000 audit[8051]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefef79560 a2=3 a3=0 items=0 ppid=1 pid=8051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:15.330688 kernel: audit: type=1327 audit(1707777194.999:2061): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:14.999000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:15.361183 kernel: audit: type=1105 audit(1707777195.004:2062): pid=8051 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.004000 audit[8051]: USER_START pid=8051 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.455656 kernel: audit: type=1103 audit(1707777195.004:2063): pid=8053 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.004000 audit[8053]: CRED_ACQ pid=8053 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.544857 kernel: audit: type=1106 audit(1707777195.087:2064): pid=8051 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.087000 audit[8051]: USER_END pid=8051 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.640928 kernel: audit: type=1104 audit(1707777195.087:2065): pid=8051 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.087000 audit[8051]: CRED_DISP pid=8051 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:15.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.49.97:22-139.178.68.195:50226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:20.097231 systemd[1]: Started sshd@69-147.75.49.97:22-139.178.68.195:36860.service. Feb 12 22:33:20.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.49.97:22-139.178.68.195:36860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:20.124179 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:33:20.124283 kernel: audit: type=1130 audit(1707777200.096:2067): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.49.97:22-139.178.68.195:36860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:20.236000 audit[8107]: USER_ACCT pid=8107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.238119 sshd[8107]: Accepted publickey for core from 139.178.68.195 port 36860 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:20.240535 sshd[8107]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:20.244852 systemd-logind[1464]: New session 49 of user core. Feb 12 22:33:20.245329 systemd[1]: Started session-49.scope. Feb 12 22:33:20.323120 sshd[8107]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:20.324396 systemd[1]: sshd@69-147.75.49.97:22-139.178.68.195:36860.service: Deactivated successfully. Feb 12 22:33:20.324843 systemd[1]: session-49.scope: Deactivated successfully. Feb 12 22:33:20.325259 systemd-logind[1464]: Session 49 logged out. Waiting for processes to exit. Feb 12 22:33:20.325773 systemd-logind[1464]: Removed session 49. Feb 12 22:33:20.239000 audit[8107]: CRED_ACQ pid=8107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.419782 kernel: audit: type=1101 audit(1707777200.236:2068): pid=8107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.419818 kernel: audit: type=1103 audit(1707777200.239:2069): pid=8107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.419836 kernel: audit: type=1006 audit(1707777200.239:2070): pid=8107 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=49 res=1 Feb 12 22:33:20.478353 kernel: audit: type=1300 audit(1707777200.239:2070): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff73c98130 a2=3 a3=0 items=0 ppid=1 pid=8107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:20.239000 audit[8107]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff73c98130 a2=3 a3=0 items=0 ppid=1 pid=8107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:20.570370 kernel: audit: type=1327 audit(1707777200.239:2070): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:20.239000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:20.601006 kernel: audit: type=1105 audit(1707777200.246:2071): pid=8107 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.246000 audit[8107]: USER_START pid=8107 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.695578 kernel: audit: type=1103 audit(1707777200.247:2072): pid=8109 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.247000 audit[8109]: CRED_ACQ pid=8109 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.784891 kernel: audit: type=1106 audit(1707777200.322:2073): pid=8107 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.322000 audit[8107]: USER_END pid=8107 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.880505 kernel: audit: type=1104 audit(1707777200.322:2074): pid=8107 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.322000 audit[8107]: CRED_DISP pid=8107 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:20.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.49.97:22-139.178.68.195:36860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:25.332708 systemd[1]: Started sshd@70-147.75.49.97:22-139.178.68.195:36876.service. Feb 12 22:33:25.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.49.97:22-139.178.68.195:36876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:25.359655 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:33:25.359695 kernel: audit: type=1130 audit(1707777205.331:2076): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.49.97:22-139.178.68.195:36876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:25.472000 audit[8134]: USER_ACCT pid=8134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:25.474143 sshd[8134]: Accepted publickey for core from 139.178.68.195 port 36876 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:25.475253 sshd[8134]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:25.477645 systemd-logind[1464]: New session 50 of user core. Feb 12 22:33:25.478126 systemd[1]: Started session-50.scope. Feb 12 22:33:25.556111 sshd[8134]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:25.557357 systemd[1]: sshd@70-147.75.49.97:22-139.178.68.195:36876.service: Deactivated successfully. Feb 12 22:33:25.557797 systemd[1]: session-50.scope: Deactivated successfully. Feb 12 22:33:25.558180 systemd-logind[1464]: Session 50 logged out. Waiting for processes to exit. Feb 12 22:33:25.558739 systemd-logind[1464]: Removed session 50. Feb 12 22:33:25.474000 audit[8134]: CRED_ACQ pid=8134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:25.655999 kernel: audit: type=1101 audit(1707777205.472:2077): pid=8134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:25.656034 kernel: audit: type=1103 audit(1707777205.474:2078): pid=8134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:25.656054 kernel: audit: type=1006 audit(1707777205.474:2079): pid=8134 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=50 res=1 Feb 12 22:33:25.714581 kernel: audit: type=1300 audit(1707777205.474:2079): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff83494ab0 a2=3 a3=0 items=0 ppid=1 pid=8134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:25.474000 audit[8134]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff83494ab0 a2=3 a3=0 items=0 ppid=1 pid=8134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:25.806618 kernel: audit: type=1327 audit(1707777205.474:2079): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:25.474000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:25.837134 kernel: audit: type=1105 audit(1707777205.479:2080): pid=8134 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:25.479000 audit[8134]: USER_START pid=8134 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:25.931638 kernel: audit: type=1103 audit(1707777205.479:2081): pid=8136 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:25.479000 audit[8136]: CRED_ACQ pid=8136 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:26.020841 kernel: audit: type=1106 audit(1707777205.555:2082): pid=8134 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:25.555000 audit[8134]: USER_END pid=8134 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:26.116415 kernel: audit: type=1104 audit(1707777205.555:2083): pid=8134 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:25.555000 audit[8134]: CRED_DISP pid=8134 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:25.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.49.97:22-139.178.68.195:36876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:30.564841 systemd[1]: Started sshd@71-147.75.49.97:22-139.178.68.195:43092.service. Feb 12 22:33:30.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.49.97:22-139.178.68.195:43092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:30.591947 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:33:30.591996 kernel: audit: type=1130 audit(1707777210.564:2085): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.49.97:22-139.178.68.195:43092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:30.705000 audit[8159]: USER_ACCT pid=8159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:30.706386 sshd[8159]: Accepted publickey for core from 139.178.68.195 port 43092 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:30.707963 sshd[8159]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:30.710252 systemd-logind[1464]: New session 51 of user core. Feb 12 22:33:30.710685 systemd[1]: Started session-51.scope. Feb 12 22:33:30.789274 sshd[8159]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:30.790695 systemd[1]: sshd@71-147.75.49.97:22-139.178.68.195:43092.service: Deactivated successfully. Feb 12 22:33:30.791133 systemd[1]: session-51.scope: Deactivated successfully. Feb 12 22:33:30.791485 systemd-logind[1464]: Session 51 logged out. Waiting for processes to exit. Feb 12 22:33:30.791891 systemd-logind[1464]: Removed session 51. Feb 12 22:33:30.706000 audit[8159]: CRED_ACQ pid=8159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:30.888166 kernel: audit: type=1101 audit(1707777210.705:2086): pid=8159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:30.888234 kernel: audit: type=1103 audit(1707777210.706:2087): pid=8159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:30.888252 kernel: audit: type=1006 audit(1707777210.706:2088): pid=8159 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=51 res=1 Feb 12 22:33:30.706000 audit[8159]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb52ad570 a2=3 a3=0 items=0 ppid=1 pid=8159 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:31.038661 kernel: audit: type=1300 audit(1707777210.706:2088): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb52ad570 a2=3 a3=0 items=0 ppid=1 pid=8159 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:31.038699 kernel: audit: type=1327 audit(1707777210.706:2088): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:30.706000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:31.069167 kernel: audit: type=1105 audit(1707777210.711:2089): pid=8159 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:30.711000 audit[8159]: USER_START pid=8159 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:31.163594 kernel: audit: type=1103 audit(1707777210.712:2090): pid=8161 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:30.712000 audit[8161]: CRED_ACQ pid=8161 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:31.252891 kernel: audit: type=1106 audit(1707777210.789:2091): pid=8159 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:30.789000 audit[8159]: USER_END pid=8159 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:31.348303 kernel: audit: type=1104 audit(1707777210.789:2092): pid=8159 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:30.789000 audit[8159]: CRED_DISP pid=8159 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:30.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.49.97:22-139.178.68.195:43092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:35.799262 systemd[1]: Started sshd@72-147.75.49.97:22-139.178.68.195:43104.service. Feb 12 22:33:35.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.49.97:22-139.178.68.195:43104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:35.826217 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:33:35.826307 kernel: audit: type=1130 audit(1707777215.798:2094): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.49.97:22-139.178.68.195:43104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:35.938000 audit[8183]: USER_ACCT pid=8183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:35.939919 sshd[8183]: Accepted publickey for core from 139.178.68.195 port 43104 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:35.941217 sshd[8183]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:35.943482 systemd-logind[1464]: New session 52 of user core. Feb 12 22:33:35.943928 systemd[1]: Started session-52.scope. Feb 12 22:33:35.940000 audit[8183]: CRED_ACQ pid=8183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:36.121581 kernel: audit: type=1101 audit(1707777215.938:2095): pid=8183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:36.121623 kernel: audit: type=1103 audit(1707777215.940:2096): pid=8183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:36.121642 kernel: audit: type=1006 audit(1707777215.940:2097): pid=8183 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=52 res=1 Feb 12 22:33:36.180217 kernel: audit: type=1300 audit(1707777215.940:2097): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1a02bd80 a2=3 a3=0 items=0 ppid=1 pid=8183 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:35.940000 audit[8183]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1a02bd80 a2=3 a3=0 items=0 ppid=1 pid=8183 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:36.272208 kernel: audit: type=1327 audit(1707777215.940:2097): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:35.940000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:36.272436 sshd[8183]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:36.273807 systemd[1]: sshd@72-147.75.49.97:22-139.178.68.195:43104.service: Deactivated successfully. Feb 12 22:33:36.274242 systemd[1]: session-52.scope: Deactivated successfully. Feb 12 22:33:36.274655 systemd-logind[1464]: Session 52 logged out. Waiting for processes to exit. Feb 12 22:33:36.275243 systemd-logind[1464]: Removed session 52. Feb 12 22:33:36.302711 kernel: audit: type=1105 audit(1707777215.945:2098): pid=8183 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:35.945000 audit[8183]: USER_START pid=8183 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:36.397143 kernel: audit: type=1103 audit(1707777215.945:2099): pid=8185 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:35.945000 audit[8185]: CRED_ACQ pid=8185 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:36.486288 kernel: audit: type=1106 audit(1707777216.272:2100): pid=8183 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:36.272000 audit[8183]: USER_END pid=8183 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:36.581736 kernel: audit: type=1104 audit(1707777216.272:2101): pid=8183 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:36.272000 audit[8183]: CRED_DISP pid=8183 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:36.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.49.97:22-139.178.68.195:43104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:41.023753 systemd[1]: Started sshd@73-147.75.49.97:22-198.235.24.239:60712.service. Feb 12 22:33:41.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.49.97:22-198.235.24.239:60712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:41.051006 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:33:41.051106 kernel: audit: type=1130 audit(1707777221.023:2103): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.49.97:22-198.235.24.239:60712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:41.228490 systemd[1]: Started sshd@74-147.75.49.97:22-139.178.68.195:38598.service. Feb 12 22:33:41.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.49.97:22-139.178.68.195:38598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:41.318980 kernel: audit: type=1130 audit(1707777221.227:2104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.49.97:22-139.178.68.195:38598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:41.342000 audit[8225]: USER_ACCT pid=8225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.343471 sshd[8225]: Accepted publickey for core from 139.178.68.195 port 38598 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:41.344537 sshd[8225]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:41.347002 systemd-logind[1464]: New session 53 of user core. Feb 12 22:33:41.347715 systemd[1]: Started session-53.scope. Feb 12 22:33:41.427291 sshd[8225]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:41.428713 systemd[1]: sshd@74-147.75.49.97:22-139.178.68.195:38598.service: Deactivated successfully. Feb 12 22:33:41.429221 systemd[1]: session-53.scope: Deactivated successfully. Feb 12 22:33:41.429652 systemd-logind[1464]: Session 53 logged out. Waiting for processes to exit. Feb 12 22:33:41.430116 systemd-logind[1464]: Removed session 53. Feb 12 22:33:41.343000 audit[8225]: CRED_ACQ pid=8225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.526176 kernel: audit: type=1101 audit(1707777221.342:2105): pid=8225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.526259 kernel: audit: type=1103 audit(1707777221.343:2106): pid=8225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.526282 kernel: audit: type=1006 audit(1707777221.343:2107): pid=8225 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=53 res=1 Feb 12 22:33:41.584780 kernel: audit: type=1300 audit(1707777221.343:2107): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee1c09ff0 a2=3 a3=0 items=0 ppid=1 pid=8225 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:41.343000 audit[8225]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee1c09ff0 a2=3 a3=0 items=0 ppid=1 pid=8225 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:41.676719 kernel: audit: type=1327 audit(1707777221.343:2107): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:41.343000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:41.707200 kernel: audit: type=1105 audit(1707777221.349:2108): pid=8225 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.349000 audit[8225]: USER_START pid=8225 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.802639 kernel: audit: type=1103 audit(1707777221.350:2109): pid=8227 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.350000 audit[8227]: CRED_ACQ pid=8227 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.427000 audit[8225]: USER_END pid=8225 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.987351 kernel: audit: type=1106 audit(1707777221.427:2110): pid=8225 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.427000 audit[8225]: CRED_DISP pid=8225 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:41.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.49.97:22-139.178.68.195:38598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:45.154886 systemd[1]: Started sshd@75-147.75.49.97:22-130.162.42.103:26916.service. Feb 12 22:33:45.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.49.97:22-130.162.42.103:26916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:45.269005 sshd[8223]: Connection reset by 198.235.24.239 port 60712 [preauth] Feb 12 22:33:45.270998 systemd[1]: sshd@73-147.75.49.97:22-198.235.24.239:60712.service: Deactivated successfully. Feb 12 22:33:45.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.49.97:22-198.235.24.239:60712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:45.843118 systemd[1]: Started sshd@76-147.75.49.97:22-201.20.104.238:39080.service. Feb 12 22:33:45.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.49.97:22-201.20.104.238:39080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:45.961272 sshd[8270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.42.103 user=root Feb 12 22:33:45.960000 audit[8270]: ANOM_LOGIN_FAILURES pid=8270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:45.960000 audit[8270]: USER_AUTH pid=8270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=130.162.42.103 addr=130.162.42.103 terminal=ssh res=failed' Feb 12 22:33:45.961326 sshd[8270]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 12 22:33:46.036864 sshd[7227]: Timeout before authentication for 101.43.12.38 port 60334 Feb 12 22:33:46.038640 systemd[1]: sshd@48-147.75.49.97:22-101.43.12.38:60334.service: Deactivated successfully. Feb 12 22:33:46.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.49.97:22-101.43.12.38:60334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:46.082199 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 22:33:46.082285 kernel: audit: type=1131 audit(1707777226.038:2118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.49.97:22-101.43.12.38:60334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:46.437077 systemd[1]: Started sshd@77-147.75.49.97:22-139.178.68.195:40216.service. Feb 12 22:33:46.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.49.97:22-139.178.68.195:40216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:46.528042 kernel: audit: type=1130 audit(1707777226.436:2119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.49.97:22-139.178.68.195:40216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:46.551000 audit[8278]: USER_ACCT pid=8278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.552517 sshd[8278]: Accepted publickey for core from 139.178.68.195 port 40216 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:46.554250 sshd[8278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:46.556497 systemd-logind[1464]: New session 54 of user core. Feb 12 22:33:46.557045 systemd[1]: Started session-54.scope. Feb 12 22:33:46.553000 audit[8278]: CRED_ACQ pid=8278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.647649 sshd[8278]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:46.649520 systemd[1]: sshd@77-147.75.49.97:22-139.178.68.195:40216.service: Deactivated successfully. Feb 12 22:33:46.649876 systemd[1]: session-54.scope: Deactivated successfully. Feb 12 22:33:46.650326 systemd-logind[1464]: Session 54 logged out. Waiting for processes to exit. Feb 12 22:33:46.650849 systemd[1]: Started sshd@78-147.75.49.97:22-139.178.68.195:40228.service. Feb 12 22:33:46.651332 systemd-logind[1464]: Removed session 54. Feb 12 22:33:46.736042 kernel: audit: type=1101 audit(1707777226.551:2120): pid=8278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.736087 kernel: audit: type=1103 audit(1707777226.553:2121): pid=8278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.736114 kernel: audit: type=1006 audit(1707777226.553:2122): pid=8278 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=54 res=1 Feb 12 22:33:46.760467 sshd[8303]: Accepted publickey for core from 139.178.68.195 port 40228 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:46.762627 sshd[8303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:46.765152 systemd-logind[1464]: New session 55 of user core. Feb 12 22:33:46.765610 systemd[1]: Started session-55.scope. Feb 12 22:33:46.553000 audit[8278]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff38b90ea0 a2=3 a3=0 items=0 ppid=1 pid=8278 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:46.860306 sshd[8274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.104.238 user=root Feb 12 22:33:46.887468 kernel: audit: type=1300 audit(1707777226.553:2122): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff38b90ea0 a2=3 a3=0 items=0 ppid=1 pid=8278 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:46.887504 kernel: audit: type=1327 audit(1707777226.553:2122): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:46.553000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:46.918154 kernel: audit: type=1105 audit(1707777226.558:2123): pid=8278 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.558000 audit[8278]: USER_START pid=8278 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:47.014005 kernel: audit: type=1103 audit(1707777226.559:2124): pid=8280 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.559000 audit[8280]: CRED_ACQ pid=8280 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:47.103717 kernel: audit: type=1106 audit(1707777226.647:2125): pid=8278 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.647000 audit[8278]: USER_END pid=8278 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.647000 audit[8278]: CRED_DISP pid=8278 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.49.97:22-139.178.68.195:40216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:46.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.49.97:22-139.178.68.195:40228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:46.759000 audit[8303]: USER_ACCT pid=8303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.761000 audit[8303]: CRED_ACQ pid=8303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.761000 audit[8303]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb5628310 a2=3 a3=0 items=0 ppid=1 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:46.761000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:46.766000 audit[8303]: USER_START pid=8303 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.767000 audit[8305]: CRED_ACQ pid=8305 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:46.859000 audit[8274]: USER_AUTH pid=8274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=201.20.104.238 addr=201.20.104.238 terminal=ssh res=failed' Feb 12 22:33:47.678686 sshd[8303]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:47.680000 audit[8303]: USER_END pid=8303 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:47.680000 audit[8303]: CRED_DISP pid=8303 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:47.686633 systemd[1]: sshd@78-147.75.49.97:22-139.178.68.195:40228.service: Deactivated successfully. Feb 12 22:33:47.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.49.97:22-139.178.68.195:40228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:47.687130 systemd[1]: session-55.scope: Deactivated successfully. Feb 12 22:33:47.687568 systemd-logind[1464]: Session 55 logged out. Waiting for processes to exit. Feb 12 22:33:47.688223 systemd[1]: Started sshd@79-147.75.49.97:22-139.178.68.195:40238.service. Feb 12 22:33:47.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.49.97:22-139.178.68.195:40238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:47.688721 systemd-logind[1464]: Removed session 55. Feb 12 22:33:47.717000 audit[8352]: USER_ACCT pid=8352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:47.718507 sshd[8352]: Accepted publickey for core from 139.178.68.195 port 40238 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:47.718000 audit[8352]: CRED_ACQ pid=8352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:47.718000 audit[8352]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc473830b0 a2=3 a3=0 items=0 ppid=1 pid=8352 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:47.718000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:47.719433 sshd[8352]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:47.722780 systemd-logind[1464]: New session 56 of user core. Feb 12 22:33:47.724004 systemd[1]: Started session-56.scope. Feb 12 22:33:47.727000 audit[8352]: USER_START pid=8352 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:47.728000 audit[8354]: CRED_ACQ pid=8354 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:48.493041 sshd[8270]: Failed password for root from 130.162.42.103 port 26916 ssh2 Feb 12 22:33:48.861088 sshd[8274]: Failed password for root from 201.20.104.238 port 39080 ssh2 Feb 12 22:33:48.986891 sshd[8352]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:48.987000 audit[8352]: USER_END pid=8352 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:48.988000 audit[8352]: CRED_DISP pid=8352 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:48.992134 systemd[1]: sshd@79-147.75.49.97:22-139.178.68.195:40238.service: Deactivated successfully. Feb 12 22:33:48.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.49.97:22-139.178.68.195:40238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:48.993859 systemd[1]: session-56.scope: Deactivated successfully. Feb 12 22:33:48.995382 systemd-logind[1464]: Session 56 logged out. Waiting for processes to exit. Feb 12 22:33:48.998050 systemd[1]: Started sshd@80-147.75.49.97:22-139.178.68.195:40250.service. Feb 12 22:33:48.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.49.97:22-139.178.68.195:40250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:48.999720 systemd-logind[1464]: Removed session 56. Feb 12 22:33:49.012000 audit[8407]: NETFILTER_CFG table=filter:128 family=2 entries=20 op=nft_register_rule pid=8407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:33:49.012000 audit[8407]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffd376a3c00 a2=0 a3=7ffd376a3bec items=0 ppid=2903 pid=8407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:49.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:33:49.014000 audit[8407]: NETFILTER_CFG table=nat:129 family=2 entries=78 op=nft_register_rule pid=8407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:33:49.014000 audit[8407]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd376a3c00 a2=0 a3=7ffd376a3bec items=0 ppid=2903 pid=8407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:49.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:33:49.037000 audit[8399]: USER_ACCT pid=8399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.038687 sshd[8399]: Accepted publickey for core from 139.178.68.195 port 40250 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:49.038000 audit[8399]: CRED_ACQ pid=8399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.038000 audit[8399]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc71b91ea0 a2=3 a3=0 items=0 ppid=1 pid=8399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:49.038000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:49.039767 sshd[8399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:49.043572 systemd-logind[1464]: New session 57 of user core. Feb 12 22:33:49.044443 systemd[1]: Started session-57.scope. Feb 12 22:33:49.047000 audit[8399]: USER_START pid=8399 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.048000 audit[8427]: CRED_ACQ pid=8427 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.060000 audit[8434]: NETFILTER_CFG table=filter:130 family=2 entries=32 op=nft_register_rule pid=8434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:33:49.060000 audit[8434]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffcb4ac5c40 a2=0 a3=7ffcb4ac5c2c items=0 ppid=2903 pid=8434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:49.060000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:33:49.061000 audit[8434]: NETFILTER_CFG table=nat:131 family=2 entries=78 op=nft_register_rule pid=8434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:33:49.061000 audit[8434]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffcb4ac5c40 a2=0 a3=7ffcb4ac5c2c items=0 ppid=2903 pid=8434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:49.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:33:49.264802 sshd[8399]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:49.264000 audit[8399]: USER_END pid=8399 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.264000 audit[8399]: CRED_DISP pid=8399 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.266603 systemd[1]: sshd@80-147.75.49.97:22-139.178.68.195:40250.service: Deactivated successfully. Feb 12 22:33:49.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.49.97:22-139.178.68.195:40250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:49.266947 systemd[1]: session-57.scope: Deactivated successfully. Feb 12 22:33:49.267312 systemd-logind[1464]: Session 57 logged out. Waiting for processes to exit. Feb 12 22:33:49.267883 systemd[1]: Started sshd@81-147.75.49.97:22-139.178.68.195:40252.service. Feb 12 22:33:49.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.49.97:22-139.178.68.195:40252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:49.268424 systemd-logind[1464]: Removed session 57. Feb 12 22:33:49.297000 audit[8456]: USER_ACCT pid=8456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.298915 sshd[8456]: Accepted publickey for core from 139.178.68.195 port 40252 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:49.299000 audit[8456]: CRED_ACQ pid=8456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.299000 audit[8456]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7a96a250 a2=3 a3=0 items=0 ppid=1 pid=8456 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:49.299000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:49.301643 sshd[8456]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:49.311616 systemd-logind[1464]: New session 58 of user core. Feb 12 22:33:49.314006 systemd[1]: Started session-58.scope. Feb 12 22:33:49.327000 audit[8456]: USER_START pid=8456 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.330000 audit[8458]: CRED_ACQ pid=8458 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.459829 sshd[8456]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:49.459000 audit[8456]: USER_END pid=8456 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.459000 audit[8456]: CRED_DISP pid=8456 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:49.461454 systemd[1]: sshd@81-147.75.49.97:22-139.178.68.195:40252.service: Deactivated successfully. Feb 12 22:33:49.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.49.97:22-139.178.68.195:40252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:49.462031 systemd[1]: session-58.scope: Deactivated successfully. Feb 12 22:33:49.462456 systemd-logind[1464]: Session 58 logged out. Waiting for processes to exit. Feb 12 22:33:49.462979 systemd-logind[1464]: Removed session 58. Feb 12 22:33:49.907392 sshd[8270]: Received disconnect from 130.162.42.103 port 26916:11: Bye Bye [preauth] Feb 12 22:33:49.907392 sshd[8270]: Disconnected from authenticating user root 130.162.42.103 port 26916 [preauth] Feb 12 22:33:49.909916 systemd[1]: sshd@75-147.75.49.97:22-130.162.42.103:26916.service: Deactivated successfully. Feb 12 22:33:49.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.49.97:22-130.162.42.103:26916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:50.847281 sshd[8274]: Received disconnect from 201.20.104.238 port 39080:11: Bye Bye [preauth] Feb 12 22:33:50.847281 sshd[8274]: Disconnected from authenticating user root 201.20.104.238 port 39080 [preauth] Feb 12 22:33:50.849844 systemd[1]: sshd@76-147.75.49.97:22-201.20.104.238:39080.service: Deactivated successfully. Feb 12 22:33:50.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.49.97:22-201.20.104.238:39080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:54.469606 systemd[1]: Started sshd@82-147.75.49.97:22-139.178.68.195:40254.service. Feb 12 22:33:54.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.49.97:22-139.178.68.195:40254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:54.496836 kernel: kauditd_printk_skb: 61 callbacks suppressed Feb 12 22:33:54.496873 kernel: audit: type=1130 audit(1707777234.468:2171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.49.97:22-139.178.68.195:40254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:54.610000 audit[8487]: USER_ACCT pid=8487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:54.611951 sshd[8487]: Accepted publickey for core from 139.178.68.195 port 40254 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:54.613230 sshd[8487]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:54.615730 systemd-logind[1464]: New session 59 of user core. Feb 12 22:33:54.616805 systemd[1]: Started session-59.scope. Feb 12 22:33:54.612000 audit[8487]: CRED_ACQ pid=8487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:54.711211 sshd[8487]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:54.712794 systemd[1]: sshd@82-147.75.49.97:22-139.178.68.195:40254.service: Deactivated successfully. Feb 12 22:33:54.713454 systemd[1]: session-59.scope: Deactivated successfully. Feb 12 22:33:54.713864 systemd-logind[1464]: Session 59 logged out. Waiting for processes to exit. Feb 12 22:33:54.714437 systemd-logind[1464]: Removed session 59. Feb 12 22:33:54.796310 kernel: audit: type=1101 audit(1707777234.610:2172): pid=8487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:54.796360 kernel: audit: type=1103 audit(1707777234.612:2173): pid=8487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:54.796375 kernel: audit: type=1006 audit(1707777234.612:2174): pid=8487 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=59 res=1 Feb 12 22:33:54.612000 audit[8487]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd39248650 a2=3 a3=0 items=0 ppid=1 pid=8487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:54.948503 kernel: audit: type=1300 audit(1707777234.612:2174): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd39248650 a2=3 a3=0 items=0 ppid=1 pid=8487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:54.948534 kernel: audit: type=1327 audit(1707777234.612:2174): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:54.612000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:54.979337 kernel: audit: type=1105 audit(1707777234.618:2175): pid=8487 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:54.618000 audit[8487]: USER_START pid=8487 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:55.074798 kernel: audit: type=1103 audit(1707777234.618:2176): pid=8489 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:54.618000 audit[8489]: CRED_ACQ pid=8489 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:55.164467 kernel: audit: type=1106 audit(1707777234.710:2177): pid=8487 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:54.710000 audit[8487]: USER_END pid=8487 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:55.260438 kernel: audit: type=1104 audit(1707777234.711:2178): pid=8487 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:54.711000 audit[8487]: CRED_DISP pid=8487 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:54.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.49.97:22-139.178.68.195:40254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:59.720917 systemd[1]: Started sshd@83-147.75.49.97:22-139.178.68.195:49932.service. Feb 12 22:33:59.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.49.97:22-139.178.68.195:49932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:59.748245 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:33:59.748363 kernel: audit: type=1130 audit(1707777239.720:2180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.49.97:22-139.178.68.195:49932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:33:59.861000 audit[8515]: USER_ACCT pid=8515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:59.862494 sshd[8515]: Accepted publickey for core from 139.178.68.195 port 49932 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:33:59.863351 sshd[8515]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:33:59.865994 systemd-logind[1464]: New session 60 of user core. Feb 12 22:33:59.866557 systemd[1]: Started session-60.scope. Feb 12 22:33:59.862000 audit[8515]: CRED_ACQ pid=8515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:59.962840 sshd[8515]: pam_unix(sshd:session): session closed for user core Feb 12 22:33:59.964656 systemd[1]: sshd@83-147.75.49.97:22-139.178.68.195:49932.service: Deactivated successfully. Feb 12 22:33:59.965115 systemd[1]: session-60.scope: Deactivated successfully. Feb 12 22:33:59.965508 systemd-logind[1464]: Session 60 logged out. Waiting for processes to exit. Feb 12 22:33:59.965902 systemd-logind[1464]: Removed session 60. Feb 12 22:34:00.046695 kernel: audit: type=1101 audit(1707777239.861:2181): pid=8515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:00.046738 kernel: audit: type=1103 audit(1707777239.862:2182): pid=8515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:00.046755 kernel: audit: type=1006 audit(1707777239.862:2183): pid=8515 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=60 res=1 Feb 12 22:34:00.105619 kernel: audit: type=1300 audit(1707777239.862:2183): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14e487b0 a2=3 a3=0 items=0 ppid=1 pid=8515 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:33:59.862000 audit[8515]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14e487b0 a2=3 a3=0 items=0 ppid=1 pid=8515 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:00.198052 kernel: audit: type=1327 audit(1707777239.862:2183): proctitle=737368643A20636F7265205B707269765D Feb 12 22:33:59.862000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:00.228695 kernel: audit: type=1105 audit(1707777239.868:2184): pid=8515 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:59.868000 audit[8515]: USER_START pid=8515 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:00.323657 kernel: audit: type=1103 audit(1707777239.868:2185): pid=8517 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:59.868000 audit[8517]: CRED_ACQ pid=8517 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:00.412841 kernel: audit: type=1106 audit(1707777239.962:2186): pid=8515 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:59.962000 audit[8515]: USER_END pid=8515 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:00.508440 kernel: audit: type=1104 audit(1707777239.962:2187): pid=8515 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:59.962000 audit[8515]: CRED_DISP pid=8515 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:33:59.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.49.97:22-139.178.68.195:49932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:04.083000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.083000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001075c60 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:34:04.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:34:04.083000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.083000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ab5e30 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:34:04.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:34:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.750865 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 22:34:04.750998 kernel: audit: type=1400 audit(1707777244.723:2191): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.929723 kernel: audit: type=1400 audit(1707777244.723:2192): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.929764 kernel: audit: type=1300 audit(1707777244.723:2191): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c01420a800 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:34:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c01420a800 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:34:04.965441 systemd[1]: Started sshd@84-147.75.49.97:22-139.178.68.195:49944.service. Feb 12 22:34:05.027344 kernel: audit: type=1327 audit(1707777244.723:2191): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:34:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:34:05.119735 kernel: audit: type=1300 audit(1707777244.723:2192): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c014ee2d80 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:34:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c014ee2d80 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:34:05.143899 sshd[8541]: Accepted publickey for core from 139.178.68.195 port 49944 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:05.145211 sshd[8541]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:05.147590 systemd-logind[1464]: New session 61 of user core. Feb 12 22:34:05.148014 systemd[1]: Started session-61.scope. Feb 12 22:34:05.217246 kernel: audit: type=1327 audit(1707777244.723:2192): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:34:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:34:05.235848 sshd[8541]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:05.237313 systemd[1]: sshd@84-147.75.49.97:22-139.178.68.195:49944.service: Deactivated successfully. Feb 12 22:34:05.237740 systemd[1]: session-61.scope: Deactivated successfully. Feb 12 22:34:05.238132 systemd-logind[1464]: Session 61 logged out. Waiting for processes to exit. Feb 12 22:34:05.238686 systemd-logind[1464]: Removed session 61. Feb 12 22:34:05.309574 kernel: audit: type=1400 audit(1707777244.723:2193): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:05.400729 kernel: audit: type=1300 audit(1707777244.723:2193): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0151b1f20 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:34:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0151b1f20 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:34:05.499143 kernel: audit: type=1327 audit(1707777244.723:2193): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:34:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:34:05.592287 kernel: audit: type=1400 audit(1707777244.723:2194): avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c015ad1fb0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:34:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:34:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c01637d000 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:34:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c008e72d80 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:34:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:34:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:34:04.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.49.97:22-139.178.68.195:49944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:05.142000 audit[8541]: USER_ACCT pid=8541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:05.144000 audit[8541]: CRED_ACQ pid=8541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:05.144000 audit[8541]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff97cb0e80 a2=3 a3=0 items=0 ppid=1 pid=8541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:05.144000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:05.149000 audit[8541]: USER_START pid=8541 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:05.149000 audit[8543]: CRED_ACQ pid=8543 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:05.235000 audit[8541]: USER_END pid=8541 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:05.235000 audit[8541]: CRED_DISP pid=8541 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:05.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.49.97:22-139.178.68.195:49944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:07.465000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:07.465000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002eb23e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:34:07.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:34:07.466000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:07.466000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a2e540 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:34:07.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:34:07.467000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:07.467000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002be9ea0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:34:07.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:34:07.477000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:34:07.477000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002be9ec0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:34:07.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:34:10.244820 systemd[1]: Started sshd@85-147.75.49.97:22-139.178.68.195:44264.service. Feb 12 22:34:10.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.49.97:22-139.178.68.195:44264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:10.271837 kernel: kauditd_printk_skb: 31 callbacks suppressed Feb 12 22:34:10.271923 kernel: audit: type=1130 audit(1707777250.243:2210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.49.97:22-139.178.68.195:44264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:10.386000 audit[8570]: USER_ACCT pid=8570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.387192 sshd[8570]: Accepted publickey for core from 139.178.68.195 port 44264 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:10.389239 sshd[8570]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:10.391611 systemd-logind[1464]: New session 62 of user core. Feb 12 22:34:10.392153 systemd[1]: Started session-62.scope. Feb 12 22:34:10.388000 audit[8570]: CRED_ACQ pid=8570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.489064 sshd[8570]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:10.490420 systemd[1]: sshd@85-147.75.49.97:22-139.178.68.195:44264.service: Deactivated successfully. Feb 12 22:34:10.490851 systemd[1]: session-62.scope: Deactivated successfully. Feb 12 22:34:10.491260 systemd-logind[1464]: Session 62 logged out. Waiting for processes to exit. Feb 12 22:34:10.491867 systemd-logind[1464]: Removed session 62. Feb 12 22:34:10.572484 kernel: audit: type=1101 audit(1707777250.386:2211): pid=8570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.572519 kernel: audit: type=1103 audit(1707777250.388:2212): pid=8570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.572537 kernel: audit: type=1006 audit(1707777250.388:2213): pid=8570 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=62 res=1 Feb 12 22:34:10.631263 kernel: audit: type=1300 audit(1707777250.388:2213): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff628ec7e0 a2=3 a3=0 items=0 ppid=1 pid=8570 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:10.388000 audit[8570]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff628ec7e0 a2=3 a3=0 items=0 ppid=1 pid=8570 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:10.723615 kernel: audit: type=1327 audit(1707777250.388:2213): proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:10.388000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:10.754217 kernel: audit: type=1105 audit(1707777250.393:2214): pid=8570 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.393000 audit[8570]: USER_START pid=8570 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.849887 kernel: audit: type=1103 audit(1707777250.394:2215): pid=8572 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.394000 audit[8572]: CRED_ACQ pid=8572 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.939499 kernel: audit: type=1106 audit(1707777250.488:2216): pid=8570 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.488000 audit[8570]: USER_END pid=8570 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:11.035430 kernel: audit: type=1104 audit(1707777250.488:2217): pid=8570 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.488000 audit[8570]: CRED_DISP pid=8570 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:10.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.49.97:22-139.178.68.195:44264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:15.499550 systemd[1]: Started sshd@86-147.75.49.97:22-139.178.68.195:44266.service. Feb 12 22:34:15.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.49.97:22-139.178.68.195:44266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:15.527336 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:34:15.527419 kernel: audit: type=1130 audit(1707777255.498:2219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.49.97:22-139.178.68.195:44266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:15.640000 audit[8634]: USER_ACCT pid=8634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:15.641529 sshd[8634]: Accepted publickey for core from 139.178.68.195 port 44266 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:15.642209 sshd[8634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:15.644477 systemd-logind[1464]: New session 63 of user core. Feb 12 22:34:15.645119 systemd[1]: Started session-63.scope. Feb 12 22:34:15.732262 sshd[8634]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:15.641000 audit[8634]: CRED_ACQ pid=8634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:15.733567 systemd[1]: sshd@86-147.75.49.97:22-139.178.68.195:44266.service: Deactivated successfully. Feb 12 22:34:15.734009 systemd[1]: session-63.scope: Deactivated successfully. Feb 12 22:34:15.734419 systemd-logind[1464]: Session 63 logged out. Waiting for processes to exit. Feb 12 22:34:15.734833 systemd-logind[1464]: Removed session 63. Feb 12 22:34:15.823620 kernel: audit: type=1101 audit(1707777255.640:2220): pid=8634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:15.823658 kernel: audit: type=1103 audit(1707777255.641:2221): pid=8634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:15.823674 kernel: audit: type=1006 audit(1707777255.641:2222): pid=8634 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=63 res=1 Feb 12 22:34:15.882114 kernel: audit: type=1300 audit(1707777255.641:2222): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8deb8de0 a2=3 a3=0 items=0 ppid=1 pid=8634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:15.641000 audit[8634]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8deb8de0 a2=3 a3=0 items=0 ppid=1 pid=8634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:15.974689 kernel: audit: type=1327 audit(1707777255.641:2222): proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:15.641000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:16.005228 kernel: audit: type=1105 audit(1707777255.646:2223): pid=8634 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:15.646000 audit[8634]: USER_START pid=8634 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:16.099733 kernel: audit: type=1103 audit(1707777255.647:2224): pid=8636 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:15.647000 audit[8636]: CRED_ACQ pid=8636 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:16.188937 kernel: audit: type=1106 audit(1707777255.731:2225): pid=8634 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:15.731000 audit[8634]: USER_END pid=8634 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:16.284419 kernel: audit: type=1104 audit(1707777255.731:2226): pid=8634 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:15.731000 audit[8634]: CRED_DISP pid=8634 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:15.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.49.97:22-139.178.68.195:44266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:20.741918 systemd[1]: Started sshd@87-147.75.49.97:22-139.178.68.195:48454.service. Feb 12 22:34:20.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.49.97:22-139.178.68.195:48454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:20.769019 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:34:20.769086 kernel: audit: type=1130 audit(1707777260.741:2228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.49.97:22-139.178.68.195:48454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:20.882000 audit[8687]: USER_ACCT pid=8687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:20.883187 sshd[8687]: Accepted publickey for core from 139.178.68.195 port 48454 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:20.884480 sshd[8687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:20.886948 systemd-logind[1464]: New session 64 of user core. Feb 12 22:34:20.887597 systemd[1]: Started session-64.scope. Feb 12 22:34:20.883000 audit[8687]: CRED_ACQ pid=8687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:20.977566 sshd[8687]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:20.979340 systemd[1]: sshd@87-147.75.49.97:22-139.178.68.195:48454.service: Deactivated successfully. Feb 12 22:34:20.980019 systemd[1]: session-64.scope: Deactivated successfully. Feb 12 22:34:20.980421 systemd-logind[1464]: Session 64 logged out. Waiting for processes to exit. Feb 12 22:34:20.980777 systemd-logind[1464]: Removed session 64. Feb 12 22:34:21.067214 kernel: audit: type=1101 audit(1707777260.882:2229): pid=8687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:21.067265 kernel: audit: type=1103 audit(1707777260.883:2230): pid=8687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:21.067285 kernel: audit: type=1006 audit(1707777260.883:2231): pid=8687 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=64 res=1 Feb 12 22:34:21.125755 kernel: audit: type=1300 audit(1707777260.883:2231): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1e3ee370 a2=3 a3=0 items=0 ppid=1 pid=8687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:20.883000 audit[8687]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1e3ee370 a2=3 a3=0 items=0 ppid=1 pid=8687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:21.217709 kernel: audit: type=1327 audit(1707777260.883:2231): proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:20.883000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:21.248221 kernel: audit: type=1105 audit(1707777260.888:2232): pid=8687 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:20.888000 audit[8687]: USER_START pid=8687 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:21.342616 kernel: audit: type=1103 audit(1707777260.889:2233): pid=8689 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:20.889000 audit[8689]: CRED_ACQ pid=8689 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:21.431773 kernel: audit: type=1106 audit(1707777260.977:2234): pid=8687 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:20.977000 audit[8687]: USER_END pid=8687 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:21.527185 kernel: audit: type=1104 audit(1707777260.977:2235): pid=8687 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:20.977000 audit[8687]: CRED_DISP pid=8687 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:20.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.49.97:22-139.178.68.195:48454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:25.980455 systemd[1]: Started sshd@88-147.75.49.97:22-139.178.68.195:48462.service. Feb 12 22:34:25.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.49.97:22-139.178.68.195:48462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:26.007171 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:34:26.007249 kernel: audit: type=1130 audit(1707777265.979:2237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.49.97:22-139.178.68.195:48462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:26.120000 audit[8714]: USER_ACCT pid=8714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.121772 sshd[8714]: Accepted publickey for core from 139.178.68.195 port 48462 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:26.123618 sshd[8714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:26.126060 systemd-logind[1464]: New session 65 of user core. Feb 12 22:34:26.126692 systemd[1]: Started session-65.scope. Feb 12 22:34:26.212847 sshd[8714]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:26.122000 audit[8714]: CRED_ACQ pid=8714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.214260 systemd[1]: sshd@88-147.75.49.97:22-139.178.68.195:48462.service: Deactivated successfully. Feb 12 22:34:26.214686 systemd[1]: session-65.scope: Deactivated successfully. Feb 12 22:34:26.215025 systemd-logind[1464]: Session 65 logged out. Waiting for processes to exit. Feb 12 22:34:26.215515 systemd-logind[1464]: Removed session 65. Feb 12 22:34:26.304705 kernel: audit: type=1101 audit(1707777266.120:2238): pid=8714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.304753 kernel: audit: type=1103 audit(1707777266.122:2239): pid=8714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.304776 kernel: audit: type=1006 audit(1707777266.122:2240): pid=8714 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=65 res=1 Feb 12 22:34:26.363233 kernel: audit: type=1300 audit(1707777266.122:2240): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda9ca3f60 a2=3 a3=0 items=0 ppid=1 pid=8714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:26.122000 audit[8714]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda9ca3f60 a2=3 a3=0 items=0 ppid=1 pid=8714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:26.455180 kernel: audit: type=1327 audit(1707777266.122:2240): proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:26.122000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:26.485652 kernel: audit: type=1105 audit(1707777266.127:2241): pid=8714 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.127000 audit[8714]: USER_START pid=8714 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.128000 audit[8716]: CRED_ACQ pid=8716 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.669267 kernel: audit: type=1103 audit(1707777266.128:2242): pid=8716 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.669303 kernel: audit: type=1106 audit(1707777266.212:2243): pid=8714 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.212000 audit[8714]: USER_END pid=8714 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.764789 kernel: audit: type=1104 audit(1707777266.212:2244): pid=8714 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.212000 audit[8714]: CRED_DISP pid=8714 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:26.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.49.97:22-139.178.68.195:48462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:31.221907 systemd[1]: Started sshd@89-147.75.49.97:22-139.178.68.195:50286.service. Feb 12 22:34:31.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.49.97:22-139.178.68.195:50286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:31.248822 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:34:31.248858 kernel: audit: type=1130 audit(1707777271.220:2246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.49.97:22-139.178.68.195:50286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:31.361000 audit[8740]: USER_ACCT pid=8740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.363154 sshd[8740]: Accepted publickey for core from 139.178.68.195 port 50286 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:31.365206 sshd[8740]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:31.367594 systemd-logind[1464]: New session 66 of user core. Feb 12 22:34:31.368120 systemd[1]: Started session-66.scope. Feb 12 22:34:31.363000 audit[8740]: CRED_ACQ pid=8740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.456776 sshd[8740]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:31.458219 systemd[1]: sshd@89-147.75.49.97:22-139.178.68.195:50286.service: Deactivated successfully. Feb 12 22:34:31.458652 systemd[1]: session-66.scope: Deactivated successfully. Feb 12 22:34:31.459061 systemd-logind[1464]: Session 66 logged out. Waiting for processes to exit. Feb 12 22:34:31.459644 systemd-logind[1464]: Removed session 66. Feb 12 22:34:31.544723 kernel: audit: type=1101 audit(1707777271.361:2247): pid=8740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.544763 kernel: audit: type=1103 audit(1707777271.363:2248): pid=8740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.544780 kernel: audit: type=1006 audit(1707777271.363:2249): pid=8740 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=66 res=1 Feb 12 22:34:31.603400 kernel: audit: type=1300 audit(1707777271.363:2249): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc60161290 a2=3 a3=0 items=0 ppid=1 pid=8740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:31.363000 audit[8740]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc60161290 a2=3 a3=0 items=0 ppid=1 pid=8740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:31.695408 kernel: audit: type=1327 audit(1707777271.363:2249): proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:31.363000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:31.725894 kernel: audit: type=1105 audit(1707777271.368:2250): pid=8740 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.368000 audit[8740]: USER_START pid=8740 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.369000 audit[8742]: CRED_ACQ pid=8742 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.909450 kernel: audit: type=1103 audit(1707777271.369:2251): pid=8742 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.909486 kernel: audit: type=1106 audit(1707777271.456:2252): pid=8740 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.456000 audit[8740]: USER_END pid=8740 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.456000 audit[8740]: CRED_DISP pid=8740 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:32.094110 kernel: audit: type=1104 audit(1707777271.456:2253): pid=8740 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:31.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.49.97:22-139.178.68.195:50286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:36.466725 systemd[1]: Started sshd@90-147.75.49.97:22-139.178.68.195:56854.service. Feb 12 22:34:36.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.49.97:22-139.178.68.195:56854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:36.493680 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:34:36.493765 kernel: audit: type=1130 audit(1707777276.464:2255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.49.97:22-139.178.68.195:56854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:36.606000 audit[8765]: USER_ACCT pid=8765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:36.608145 sshd[8765]: Accepted publickey for core from 139.178.68.195 port 56854 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:36.610279 sshd[8765]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:36.612627 systemd-logind[1464]: New session 67 of user core. Feb 12 22:34:36.613272 systemd[1]: Started session-67.scope. Feb 12 22:34:36.701059 sshd[8765]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:36.608000 audit[8765]: CRED_ACQ pid=8765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:36.702213 systemd[1]: sshd@90-147.75.49.97:22-139.178.68.195:56854.service: Deactivated successfully. Feb 12 22:34:36.702643 systemd[1]: session-67.scope: Deactivated successfully. Feb 12 22:34:36.703011 systemd-logind[1464]: Session 67 logged out. Waiting for processes to exit. Feb 12 22:34:36.703496 systemd-logind[1464]: Removed session 67. Feb 12 22:34:36.791609 kernel: audit: type=1101 audit(1707777276.606:2256): pid=8765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:36.791646 kernel: audit: type=1103 audit(1707777276.608:2257): pid=8765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:36.791664 kernel: audit: type=1006 audit(1707777276.608:2258): pid=8765 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=67 res=1 Feb 12 22:34:36.850205 kernel: audit: type=1300 audit(1707777276.608:2258): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffced767670 a2=3 a3=0 items=0 ppid=1 pid=8765 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:36.608000 audit[8765]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffced767670 a2=3 a3=0 items=0 ppid=1 pid=8765 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:36.608000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:36.972787 kernel: audit: type=1327 audit(1707777276.608:2258): proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:36.972816 kernel: audit: type=1105 audit(1707777276.613:2259): pid=8765 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:36.613000 audit[8765]: USER_START pid=8765 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:37.067225 kernel: audit: type=1103 audit(1707777276.614:2260): pid=8767 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:36.614000 audit[8767]: CRED_ACQ pid=8767 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:37.156390 kernel: audit: type=1106 audit(1707777276.699:2261): pid=8765 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:36.699000 audit[8765]: USER_END pid=8765 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:37.251863 kernel: audit: type=1104 audit(1707777276.699:2262): pid=8765 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:36.699000 audit[8765]: CRED_DISP pid=8765 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:36.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.49.97:22-139.178.68.195:56854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:37.874984 systemd[1]: Started sshd@91-147.75.49.97:22-130.162.42.103:45248.service. Feb 12 22:34:37.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.49.97:22-130.162.42.103:45248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:38.691655 sshd[8789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.42.103 user=root Feb 12 22:34:38.691000 audit[8789]: USER_AUTH pid=8789 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=130.162.42.103 addr=130.162.42.103 terminal=ssh res=failed' Feb 12 22:34:40.833199 sshd[8789]: Failed password for root from 130.162.42.103 port 45248 ssh2 Feb 12 22:34:41.707103 systemd[1]: Started sshd@92-147.75.49.97:22-139.178.68.195:56858.service. Feb 12 22:34:41.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.49.97:22-139.178.68.195:56858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:41.733589 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 12 22:34:41.733635 kernel: audit: type=1130 audit(1707777281.706:2266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.49.97:22-139.178.68.195:56858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:41.844000 audit[8813]: USER_ACCT pid=8813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:41.845427 sshd[8813]: Accepted publickey for core from 139.178.68.195 port 56858 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:41.846191 sshd[8813]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:41.848398 systemd-logind[1464]: New session 68 of user core. Feb 12 22:34:41.848850 systemd[1]: Started session-68.scope. Feb 12 22:34:41.935719 sshd[8813]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:41.844000 audit[8813]: CRED_ACQ pid=8813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:41.937133 systemd[1]: sshd@92-147.75.49.97:22-139.178.68.195:56858.service: Deactivated successfully. Feb 12 22:34:41.937570 systemd[1]: session-68.scope: Deactivated successfully. Feb 12 22:34:41.937835 systemd-logind[1464]: Session 68 logged out. Waiting for processes to exit. Feb 12 22:34:41.938443 systemd-logind[1464]: Removed session 68. Feb 12 22:34:42.027126 kernel: audit: type=1101 audit(1707777281.844:2267): pid=8813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:42.027176 kernel: audit: type=1103 audit(1707777281.844:2268): pid=8813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:42.027194 kernel: audit: type=1006 audit(1707777281.844:2269): pid=8813 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=68 res=1 Feb 12 22:34:42.085797 kernel: audit: type=1300 audit(1707777281.844:2269): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47f1daf0 a2=3 a3=0 items=0 ppid=1 pid=8813 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:41.844000 audit[8813]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47f1daf0 a2=3 a3=0 items=0 ppid=1 pid=8813 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:42.177690 kernel: audit: type=1327 audit(1707777281.844:2269): proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:41.844000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:42.208189 kernel: audit: type=1105 audit(1707777281.849:2270): pid=8813 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:41.849000 audit[8813]: USER_START pid=8813 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:42.302579 kernel: audit: type=1103 audit(1707777281.849:2271): pid=8815 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:41.849000 audit[8815]: CRED_ACQ pid=8815 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:41.934000 audit[8813]: USER_END pid=8813 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:42.487053 kernel: audit: type=1106 audit(1707777281.934:2272): pid=8813 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:42.487106 kernel: audit: type=1104 audit(1707777281.934:2273): pid=8813 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:41.934000 audit[8813]: CRED_DISP pid=8813 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:41.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.49.97:22-139.178.68.195:56858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:42.633606 sshd[8789]: Received disconnect from 130.162.42.103 port 45248:11: Bye Bye [preauth] Feb 12 22:34:42.633606 sshd[8789]: Disconnected from authenticating user root 130.162.42.103 port 45248 [preauth] Feb 12 22:34:42.636207 systemd[1]: sshd@91-147.75.49.97:22-130.162.42.103:45248.service: Deactivated successfully. Feb 12 22:34:42.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.49.97:22-130.162.42.103:45248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:44.560032 systemd[1]: Started sshd@93-147.75.49.97:22-137.220.228.67:42216.service. Feb 12 22:34:44.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.49.97:22-137.220.228.67:42216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:45.214707 sshd[8839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.220.228.67 user=root Feb 12 22:34:45.213000 audit[8839]: USER_AUTH pid=8839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=137.220.228.67 addr=137.220.228.67 terminal=ssh res=failed' Feb 12 22:34:46.945910 systemd[1]: Started sshd@94-147.75.49.97:22-139.178.68.195:47164.service. Feb 12 22:34:46.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.49.97:22-139.178.68.195:47164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:46.973019 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 22:34:46.973221 kernel: audit: type=1130 audit(1707777286.944:2278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.49.97:22-139.178.68.195:47164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:47.087647 sshd[8842]: Accepted publickey for core from 139.178.68.195 port 47164 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:47.086000 audit[8842]: USER_ACCT pid=8842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.088901 sshd[8842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:47.091222 systemd-logind[1464]: New session 69 of user core. Feb 12 22:34:47.091718 systemd[1]: Started session-69.scope. Feb 12 22:34:47.086000 audit[8842]: CRED_ACQ pid=8842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.182230 sshd[8842]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:47.183607 systemd[1]: sshd@94-147.75.49.97:22-139.178.68.195:47164.service: Deactivated successfully. Feb 12 22:34:47.184037 systemd[1]: session-69.scope: Deactivated successfully. Feb 12 22:34:47.184384 systemd-logind[1464]: Session 69 logged out. Waiting for processes to exit. Feb 12 22:34:47.184796 systemd-logind[1464]: Removed session 69. Feb 12 22:34:47.269355 kernel: audit: type=1101 audit(1707777287.086:2279): pid=8842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.269444 kernel: audit: type=1103 audit(1707777287.086:2280): pid=8842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.269484 kernel: audit: type=1006 audit(1707777287.086:2281): pid=8842 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=69 res=1 Feb 12 22:34:47.086000 audit[8842]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbec6b670 a2=3 a3=0 items=0 ppid=1 pid=8842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:47.419770 kernel: audit: type=1300 audit(1707777287.086:2281): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbec6b670 a2=3 a3=0 items=0 ppid=1 pid=8842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:47.419880 kernel: audit: type=1327 audit(1707777287.086:2281): proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:47.086000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:47.092000 audit[8842]: USER_START pid=8842 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.544674 kernel: audit: type=1105 audit(1707777287.092:2282): pid=8842 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.544744 kernel: audit: type=1103 audit(1707777287.092:2283): pid=8844 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.092000 audit[8844]: CRED_ACQ pid=8844 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.180000 audit[8842]: USER_END pid=8842 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.651074 sshd[8839]: Failed password for root from 137.220.228.67 port 42216 ssh2 Feb 12 22:34:47.729305 kernel: audit: type=1106 audit(1707777287.180:2284): pid=8842 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.729339 kernel: audit: type=1104 audit(1707777287.181:2285): pid=8842 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.181000 audit[8842]: CRED_DISP pid=8842 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:47.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.49.97:22-139.178.68.195:47164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:49.122390 sshd[8839]: Received disconnect from 137.220.228.67 port 42216:11: Bye Bye [preauth] Feb 12 22:34:49.122390 sshd[8839]: Disconnected from authenticating user root 137.220.228.67 port 42216 [preauth] Feb 12 22:34:49.125031 systemd[1]: sshd@93-147.75.49.97:22-137.220.228.67:42216.service: Deactivated successfully. Feb 12 22:34:49.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.49.97:22-137.220.228.67:42216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:52.192131 systemd[1]: Started sshd@95-147.75.49.97:22-139.178.68.195:47168.service. Feb 12 22:34:52.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.49.97:22-139.178.68.195:47168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:52.219212 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 22:34:52.219272 kernel: audit: type=1130 audit(1707777292.190:2288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.49.97:22-139.178.68.195:47168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:52.332000 audit[8896]: USER_ACCT pid=8896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.333275 sshd[8896]: Accepted publickey for core from 139.178.68.195 port 47168 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:52.335237 sshd[8896]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:52.337610 systemd-logind[1464]: New session 70 of user core. Feb 12 22:34:52.338131 systemd[1]: Started session-70.scope. Feb 12 22:34:52.333000 audit[8896]: CRED_ACQ pid=8896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.425780 sshd[8896]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:52.427236 systemd[1]: sshd@95-147.75.49.97:22-139.178.68.195:47168.service: Deactivated successfully. Feb 12 22:34:52.427666 systemd[1]: session-70.scope: Deactivated successfully. Feb 12 22:34:52.428003 systemd-logind[1464]: Session 70 logged out. Waiting for processes to exit. Feb 12 22:34:52.428529 systemd-logind[1464]: Removed session 70. Feb 12 22:34:52.505840 systemd[1]: Started sshd@96-147.75.49.97:22-43.155.157.138:35220.service. Feb 12 22:34:52.514870 kernel: audit: type=1101 audit(1707777292.332:2289): pid=8896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.514964 kernel: audit: type=1103 audit(1707777292.333:2290): pid=8896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.515004 kernel: audit: type=1006 audit(1707777292.333:2291): pid=8896 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=70 res=1 Feb 12 22:34:52.333000 audit[8896]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffda76f5e0 a2=3 a3=0 items=0 ppid=1 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:52.665417 kernel: audit: type=1300 audit(1707777292.333:2291): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffda76f5e0 a2=3 a3=0 items=0 ppid=1 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:52.665487 kernel: audit: type=1327 audit(1707777292.333:2291): proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:52.333000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:52.338000 audit[8896]: USER_START pid=8896 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.790408 kernel: audit: type=1105 audit(1707777292.338:2292): pid=8896 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.790466 kernel: audit: type=1103 audit(1707777292.338:2293): pid=8898 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.338000 audit[8898]: CRED_ACQ pid=8898 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.425000 audit[8896]: USER_END pid=8896 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.975147 kernel: audit: type=1106 audit(1707777292.425:2294): pid=8896 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.975205 kernel: audit: type=1104 audit(1707777292.425:2295): pid=8896 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.425000 audit[8896]: CRED_DISP pid=8896 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:52.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.49.97:22-139.178.68.195:47168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:52.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.49.97:22-43.155.157.138:35220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:53.385642 sshd[8921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.157.138 user=root Feb 12 22:34:53.383000 audit[8921]: ANOM_LOGIN_FAILURES pid=8921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:53.384000 audit[8921]: USER_AUTH pid=8921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.157.138 addr=43.155.157.138 terminal=ssh res=failed' Feb 12 22:34:53.385875 sshd[8921]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 12 22:34:55.251497 sshd[8921]: Failed password for root from 43.155.157.138 port 35220 ssh2 Feb 12 22:34:55.425341 sshd[8921]: Received disconnect from 43.155.157.138 port 35220:11: Bye Bye [preauth] Feb 12 22:34:55.425341 sshd[8921]: Disconnected from authenticating user root 43.155.157.138 port 35220 [preauth] Feb 12 22:34:55.427877 systemd[1]: sshd@96-147.75.49.97:22-43.155.157.138:35220.service: Deactivated successfully. Feb 12 22:34:55.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.49.97:22-43.155.157.138:35220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:57.437324 systemd[1]: Started sshd@97-147.75.49.97:22-139.178.68.195:59294.service. Feb 12 22:34:57.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-147.75.49.97:22-139.178.68.195:59294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:57.464724 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 12 22:34:57.464781 kernel: audit: type=1130 audit(1707777297.435:2301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-147.75.49.97:22-139.178.68.195:59294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:34:57.577000 audit[8926]: USER_ACCT pid=8926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:57.579134 sshd[8926]: Accepted publickey for core from 139.178.68.195 port 59294 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:34:57.580244 sshd[8926]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:34:57.582756 systemd-logind[1464]: New session 71 of user core. Feb 12 22:34:57.583342 systemd[1]: Started session-71.scope. Feb 12 22:34:57.670756 sshd[8926]: pam_unix(sshd:session): session closed for user core Feb 12 22:34:57.672235 systemd[1]: sshd@97-147.75.49.97:22-139.178.68.195:59294.service: Deactivated successfully. Feb 12 22:34:57.578000 audit[8926]: CRED_ACQ pid=8926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:57.672666 systemd[1]: session-71.scope: Deactivated successfully. Feb 12 22:34:57.672949 kernel: audit: type=1101 audit(1707777297.577:2302): pid=8926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:57.672996 kernel: audit: type=1103 audit(1707777297.578:2303): pid=8926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:57.672967 systemd-logind[1464]: Session 71 logged out. Waiting for processes to exit. Feb 12 22:34:57.673478 systemd-logind[1464]: Removed session 71. Feb 12 22:34:57.821584 kernel: audit: type=1006 audit(1707777297.578:2304): pid=8926 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=71 res=1 Feb 12 22:34:57.821624 kernel: audit: type=1300 audit(1707777297.578:2304): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb8e5f500 a2=3 a3=0 items=0 ppid=1 pid=8926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:57.578000 audit[8926]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb8e5f500 a2=3 a3=0 items=0 ppid=1 pid=8926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:34:57.913639 kernel: audit: type=1327 audit(1707777297.578:2304): proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:57.578000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:34:57.944187 kernel: audit: type=1105 audit(1707777297.583:2305): pid=8926 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:57.583000 audit[8926]: USER_START pid=8926 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:57.584000 audit[8928]: CRED_ACQ pid=8928 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:58.039015 kernel: audit: type=1103 audit(1707777297.584:2306): pid=8928 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:57.669000 audit[8926]: USER_END pid=8926 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:58.223771 kernel: audit: type=1106 audit(1707777297.669:2307): pid=8926 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:58.223804 kernel: audit: type=1104 audit(1707777297.669:2308): pid=8926 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:57.669000 audit[8926]: CRED_DISP pid=8926 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:34:57.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-147.75.49.97:22-139.178.68.195:59294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:02.680135 systemd[1]: Started sshd@98-147.75.49.97:22-139.178.68.195:59300.service. Feb 12 22:35:02.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-147.75.49.97:22-139.178.68.195:59300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:02.707287 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:35:02.707368 kernel: audit: type=1130 audit(1707777302.678:2310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-147.75.49.97:22-139.178.68.195:59300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:02.821000 audit[8953]: USER_ACCT pid=8953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:02.822459 sshd[8953]: Accepted publickey for core from 139.178.68.195 port 59300 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:02.824255 sshd[8953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:02.827014 systemd-logind[1464]: New session 72 of user core. Feb 12 22:35:02.827552 systemd[1]: Started session-72.scope. Feb 12 22:35:02.822000 audit[8953]: CRED_ACQ pid=8953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:02.915667 sshd[8953]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:02.917167 systemd[1]: sshd@98-147.75.49.97:22-139.178.68.195:59300.service: Deactivated successfully. Feb 12 22:35:02.917606 systemd[1]: session-72.scope: Deactivated successfully. Feb 12 22:35:02.917969 systemd-logind[1464]: Session 72 logged out. Waiting for processes to exit. Feb 12 22:35:02.918484 systemd-logind[1464]: Removed session 72. Feb 12 22:35:03.004395 kernel: audit: type=1101 audit(1707777302.821:2311): pid=8953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:03.004434 kernel: audit: type=1103 audit(1707777302.822:2312): pid=8953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:03.004451 kernel: audit: type=1006 audit(1707777302.822:2313): pid=8953 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=72 res=1 Feb 12 22:35:03.062989 kernel: audit: type=1300 audit(1707777302.822:2313): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8db0e6f0 a2=3 a3=0 items=0 ppid=1 pid=8953 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:02.822000 audit[8953]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8db0e6f0 a2=3 a3=0 items=0 ppid=1 pid=8953 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:03.155002 kernel: audit: type=1327 audit(1707777302.822:2313): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:02.822000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:03.185534 kernel: audit: type=1105 audit(1707777302.828:2314): pid=8953 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:02.828000 audit[8953]: USER_START pid=8953 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:03.218031 systemd[1]: Started sshd@99-147.75.49.97:22-200.1.219.138:45070.service. Feb 12 22:35:03.280001 kernel: audit: type=1103 audit(1707777302.829:2315): pid=8955 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:02.829000 audit[8955]: CRED_ACQ pid=8955 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:02.914000 audit[8953]: USER_END pid=8953 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:03.370009 kernel: audit: type=1106 audit(1707777302.914:2316): pid=8953 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:02.914000 audit[8953]: CRED_DISP pid=8953 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:03.554099 kernel: audit: type=1104 audit(1707777302.914:2317): pid=8953 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:02.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-147.75.49.97:22-139.178.68.195:59300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:03.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-147.75.49.97:22-200.1.219.138:45070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:04.083000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:04.083000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e13d40 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:35:04.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:35:04.083000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:04.083000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001f75240 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:35:04.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:35:04.507042 sshd[8978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.1.219.138 user=root Feb 12 22:35:04.505000 audit[8978]: USER_AUTH pid=8978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=200.1.219.138 addr=200.1.219.138 terminal=ssh res=failed' Feb 12 22:35:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c002963fb0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:35:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:35:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c011e23b30 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:35:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:35:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c012952aa0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:35:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:35:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:04.723000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00adff4a0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:35:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:35:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c009ccbbc0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:35:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:35:04.723000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00bb21820 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:35:04.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:35:04.970362 systemd[1]: Started sshd@100-147.75.49.97:22-201.20.104.238:57460.service. Feb 12 22:35:04.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-147.75.49.97:22-201.20.104.238:57460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:05.979843 sshd[8981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.104.238 user=root Feb 12 22:35:05.977000 audit[8981]: USER_AUTH pid=8981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=201.20.104.238 addr=201.20.104.238 terminal=ssh res=failed' Feb 12 22:35:06.216198 sshd[8978]: Failed password for root from 200.1.219.138 port 45070 ssh2 Feb 12 22:35:06.623793 sshd[8978]: Received disconnect from 200.1.219.138 port 45070:11: Bye Bye [preauth] Feb 12 22:35:06.623793 sshd[8978]: Disconnected from authenticating user root 200.1.219.138 port 45070 [preauth] Feb 12 22:35:06.626357 systemd[1]: sshd@99-147.75.49.97:22-200.1.219.138:45070.service: Deactivated successfully. Feb 12 22:35:06.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-147.75.49.97:22-200.1.219.138:45070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:07.464000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:07.464000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f5bb60 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:35:07.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:35:07.466000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:07.466000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f75440 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:35:07.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:35:07.466000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:07.466000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002f5bb80 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:35:07.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:35:07.478000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:35:07.478000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025ca820 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:35:07.478000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:35:07.825394 sshd[8981]: Failed password for root from 201.20.104.238 port 57460 ssh2 Feb 12 22:35:07.925045 systemd[1]: Started sshd@101-147.75.49.97:22-139.178.68.195:44318.service. Feb 12 22:35:07.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-147.75.49.97:22-139.178.68.195:44318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:07.952420 kernel: kauditd_printk_skb: 42 callbacks suppressed Feb 12 22:35:07.952573 kernel: audit: type=1130 audit(1707777307.923:2336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-147.75.49.97:22-139.178.68.195:44318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:08.063648 sshd[8981]: Received disconnect from 201.20.104.238 port 57460:11: Bye Bye [preauth] Feb 12 22:35:08.063648 sshd[8981]: Disconnected from authenticating user root 201.20.104.238 port 57460 [preauth] Feb 12 22:35:08.064160 systemd[1]: sshd@100-147.75.49.97:22-201.20.104.238:57460.service: Deactivated successfully. Feb 12 22:35:08.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-147.75.49.97:22-201.20.104.238:57460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:08.067179 sshd[8985]: Accepted publickey for core from 139.178.68.195 port 44318 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:08.069390 sshd[8985]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:08.071804 systemd-logind[1464]: New session 73 of user core. Feb 12 22:35:08.072314 systemd[1]: Started session-73.scope. Feb 12 22:35:08.065000 audit[8985]: USER_ACCT pid=8985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.158741 sshd[8985]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:08.160016 systemd[1]: sshd@101-147.75.49.97:22-139.178.68.195:44318.service: Deactivated successfully. Feb 12 22:35:08.160425 systemd[1]: session-73.scope: Deactivated successfully. Feb 12 22:35:08.160736 systemd-logind[1464]: Session 73 logged out. Waiting for processes to exit. Feb 12 22:35:08.161115 systemd-logind[1464]: Removed session 73. Feb 12 22:35:08.244154 kernel: audit: type=1131 audit(1707777308.063:2337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-147.75.49.97:22-201.20.104.238:57460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:08.244223 kernel: audit: type=1101 audit(1707777308.065:2338): pid=8985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.244267 kernel: audit: type=1103 audit(1707777308.068:2339): pid=8985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.068000 audit[8985]: CRED_ACQ pid=8985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.393151 kernel: audit: type=1006 audit(1707777308.068:2340): pid=8985 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=73 res=1 Feb 12 22:35:08.393241 kernel: audit: type=1300 audit(1707777308.068:2340): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1d8d66c0 a2=3 a3=0 items=0 ppid=1 pid=8985 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:08.068000 audit[8985]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1d8d66c0 a2=3 a3=0 items=0 ppid=1 pid=8985 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:08.485076 kernel: audit: type=1327 audit(1707777308.068:2340): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:08.068000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:08.515606 kernel: audit: type=1105 audit(1707777308.072:2341): pid=8985 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.072000 audit[8985]: USER_START pid=8985 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.611002 kernel: audit: type=1103 audit(1707777308.073:2342): pid=8990 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.073000 audit[8990]: CRED_ACQ pid=8990 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.700243 kernel: audit: type=1106 audit(1707777308.157:2343): pid=8985 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.157000 audit[8985]: USER_END pid=8985 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.157000 audit[8985]: CRED_DISP pid=8985 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:08.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-147.75.49.97:22-139.178.68.195:44318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:13.170728 systemd[1]: Started sshd@102-147.75.49.97:22-139.178.68.195:44320.service. Feb 12 22:35:13.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-147.75.49.97:22-139.178.68.195:44320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:13.198370 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 22:35:13.198458 kernel: audit: type=1130 audit(1707777313.169:2346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-147.75.49.97:22-139.178.68.195:44320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:13.312000 audit[9053]: USER_ACCT pid=9053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.314418 sshd[9053]: Accepted publickey for core from 139.178.68.195 port 44320 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:13.317749 sshd[9053]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:13.327613 systemd-logind[1464]: New session 74 of user core. Feb 12 22:35:13.329936 systemd[1]: Started session-74.scope. Feb 12 22:35:13.314000 audit[9053]: CRED_ACQ pid=9053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.423623 sshd[9053]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:13.424887 systemd[1]: sshd@102-147.75.49.97:22-139.178.68.195:44320.service: Deactivated successfully. Feb 12 22:35:13.425326 systemd[1]: session-74.scope: Deactivated successfully. Feb 12 22:35:13.425712 systemd-logind[1464]: Session 74 logged out. Waiting for processes to exit. Feb 12 22:35:13.426151 systemd-logind[1464]: Removed session 74. Feb 12 22:35:13.497060 kernel: audit: type=1101 audit(1707777313.312:2347): pid=9053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.497102 kernel: audit: type=1103 audit(1707777313.314:2348): pid=9053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.497118 kernel: audit: type=1006 audit(1707777313.315:2349): pid=9053 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=74 res=1 Feb 12 22:35:13.315000 audit[9053]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3709eb40 a2=3 a3=0 items=0 ppid=1 pid=9053 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:13.648486 kernel: audit: type=1300 audit(1707777313.315:2349): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3709eb40 a2=3 a3=0 items=0 ppid=1 pid=9053 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:13.648519 kernel: audit: type=1327 audit(1707777313.315:2349): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:13.315000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:13.679152 kernel: audit: type=1105 audit(1707777313.336:2350): pid=9053 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.336000 audit[9053]: USER_START pid=9053 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.774163 kernel: audit: type=1103 audit(1707777313.338:2351): pid=9055 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.338000 audit[9055]: CRED_ACQ pid=9055 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.863958 kernel: audit: type=1106 audit(1707777313.422:2352): pid=9053 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.422000 audit[9053]: USER_END pid=9053 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.422000 audit[9053]: CRED_DISP pid=9053 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:14.050008 kernel: audit: type=1104 audit(1707777313.422:2353): pid=9053 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:13.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-147.75.49.97:22-139.178.68.195:44320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:18.434904 systemd[1]: Started sshd@103-147.75.49.97:22-139.178.68.195:43978.service. Feb 12 22:35:18.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-147.75.49.97:22-139.178.68.195:43978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:18.462424 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:35:18.462530 kernel: audit: type=1130 audit(1707777318.433:2355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-147.75.49.97:22-139.178.68.195:43978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:18.577000 audit[9119]: USER_ACCT pid=9119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:18.578409 sshd[9119]: Accepted publickey for core from 139.178.68.195 port 43978 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:18.581251 sshd[9119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:18.583446 systemd-logind[1464]: New session 75 of user core. Feb 12 22:35:18.583981 systemd[1]: Started session-75.scope. Feb 12 22:35:18.579000 audit[9119]: CRED_ACQ pid=9119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:18.760578 kernel: audit: type=1101 audit(1707777318.577:2356): pid=9119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:18.760620 kernel: audit: type=1103 audit(1707777318.579:2357): pid=9119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:18.760645 kernel: audit: type=1006 audit(1707777318.579:2358): pid=9119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=75 res=1 Feb 12 22:35:18.579000 audit[9119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe060ba820 a2=3 a3=0 items=0 ppid=1 pid=9119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:18.912132 kernel: audit: type=1300 audit(1707777318.579:2358): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe060ba820 a2=3 a3=0 items=0 ppid=1 pid=9119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:18.912200 kernel: audit: type=1327 audit(1707777318.579:2358): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:18.579000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:18.912392 sshd[9119]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:18.913799 systemd[1]: sshd@103-147.75.49.97:22-139.178.68.195:43978.service: Deactivated successfully. Feb 12 22:35:18.914222 systemd[1]: session-75.scope: Deactivated successfully. Feb 12 22:35:18.914599 systemd-logind[1464]: Session 75 logged out. Waiting for processes to exit. Feb 12 22:35:18.915142 systemd-logind[1464]: Removed session 75. Feb 12 22:35:18.942900 kernel: audit: type=1105 audit(1707777318.584:2359): pid=9119 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:18.584000 audit[9119]: USER_START pid=9119 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:19.038003 kernel: audit: type=1103 audit(1707777318.584:2360): pid=9121 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:18.584000 audit[9121]: CRED_ACQ pid=9121 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:19.127325 kernel: audit: type=1106 audit(1707777318.911:2361): pid=9119 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:18.911000 audit[9119]: USER_END pid=9119 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:19.222924 kernel: audit: type=1104 audit(1707777318.911:2362): pid=9119 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:18.911000 audit[9119]: CRED_DISP pid=9119 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:18.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-147.75.49.97:22-139.178.68.195:43978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:23.869386 systemd[1]: Started sshd@104-147.75.49.97:22-139.178.68.195:43982.service. Feb 12 22:35:23.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-147.75.49.97:22-139.178.68.195:43982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:23.895995 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:35:23.896074 kernel: audit: type=1130 audit(1707777323.867:2364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-147.75.49.97:22-139.178.68.195:43982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:24.009000 audit[9147]: USER_ACCT pid=9147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.011390 sshd[9147]: Accepted publickey for core from 139.178.68.195 port 43982 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:24.015215 sshd[9147]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:24.020411 systemd-logind[1464]: New session 76 of user core. Feb 12 22:35:24.020913 systemd[1]: Started session-76.scope. Feb 12 22:35:24.012000 audit[9147]: CRED_ACQ pid=9147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.114712 sshd[9147]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:24.115998 systemd[1]: sshd@104-147.75.49.97:22-139.178.68.195:43982.service: Deactivated successfully. Feb 12 22:35:24.116427 systemd[1]: session-76.scope: Deactivated successfully. Feb 12 22:35:24.116787 systemd-logind[1464]: Session 76 logged out. Waiting for processes to exit. Feb 12 22:35:24.117429 systemd-logind[1464]: Removed session 76. Feb 12 22:35:24.194708 kernel: audit: type=1101 audit(1707777324.009:2365): pid=9147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.194749 kernel: audit: type=1103 audit(1707777324.012:2366): pid=9147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.194766 kernel: audit: type=1006 audit(1707777324.012:2367): pid=9147 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=76 res=1 Feb 12 22:35:24.253325 kernel: audit: type=1300 audit(1707777324.012:2367): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf95f7320 a2=3 a3=0 items=0 ppid=1 pid=9147 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:24.012000 audit[9147]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf95f7320 a2=3 a3=0 items=0 ppid=1 pid=9147 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:24.345377 kernel: audit: type=1327 audit(1707777324.012:2367): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:24.012000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:24.375902 kernel: audit: type=1105 audit(1707777324.021:2368): pid=9147 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.021000 audit[9147]: USER_START pid=9147 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.470483 kernel: audit: type=1103 audit(1707777324.021:2369): pid=9149 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.021000 audit[9149]: CRED_ACQ pid=9149 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.559773 kernel: audit: type=1106 audit(1707777324.113:2370): pid=9147 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.113000 audit[9147]: USER_END pid=9147 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.113000 audit[9147]: CRED_DISP pid=9147 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.744776 kernel: audit: type=1104 audit(1707777324.113:2371): pid=9147 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:24.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-147.75.49.97:22-139.178.68.195:43982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:29.126414 systemd[1]: Started sshd@105-147.75.49.97:22-139.178.68.195:47522.service. Feb 12 22:35:29.127357 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:35:29.127506 kernel: audit: type=1130 audit(1707777329.125:2373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-147.75.49.97:22-139.178.68.195:47522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:29.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-147.75.49.97:22-139.178.68.195:47522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:29.268000 audit[9172]: USER_ACCT pid=9172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.268501 sshd[9172]: Accepted publickey for core from 139.178.68.195 port 47522 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:29.271221 sshd[9172]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:29.273590 systemd-logind[1464]: New session 77 of user core. Feb 12 22:35:29.274151 systemd[1]: Started session-77.scope. Feb 12 22:35:29.270000 audit[9172]: CRED_ACQ pid=9172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.360360 sshd[9172]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:29.361701 systemd[1]: sshd@105-147.75.49.97:22-139.178.68.195:47522.service: Deactivated successfully. Feb 12 22:35:29.362145 systemd[1]: session-77.scope: Deactivated successfully. Feb 12 22:35:29.362548 systemd-logind[1464]: Session 77 logged out. Waiting for processes to exit. Feb 12 22:35:29.362919 systemd-logind[1464]: Removed session 77. Feb 12 22:35:29.450389 kernel: audit: type=1101 audit(1707777329.268:2374): pid=9172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.450425 kernel: audit: type=1103 audit(1707777329.270:2375): pid=9172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.450443 kernel: audit: type=1006 audit(1707777329.270:2376): pid=9172 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=77 res=1 Feb 12 22:35:29.508998 kernel: audit: type=1300 audit(1707777329.270:2376): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5ad18f50 a2=3 a3=0 items=0 ppid=1 pid=9172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:29.270000 audit[9172]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5ad18f50 a2=3 a3=0 items=0 ppid=1 pid=9172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:29.270000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:29.631628 kernel: audit: type=1327 audit(1707777329.270:2376): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:29.631663 kernel: audit: type=1105 audit(1707777329.275:2377): pid=9172 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.275000 audit[9172]: USER_START pid=9172 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.726160 kernel: audit: type=1103 audit(1707777329.276:2378): pid=9174 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.276000 audit[9174]: CRED_ACQ pid=9174 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.815506 kernel: audit: type=1106 audit(1707777329.360:2379): pid=9172 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.360000 audit[9172]: USER_END pid=9172 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.360000 audit[9172]: CRED_DISP pid=9172 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:30.000573 kernel: audit: type=1104 audit(1707777329.360:2380): pid=9172 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:29.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-147.75.49.97:22-139.178.68.195:47522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:31.502619 systemd[1]: Started sshd@106-147.75.49.97:22-130.162.42.103:63580.service. Feb 12 22:35:31.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.49.97:22-130.162.42.103:63580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:32.311432 sshd[9196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.42.103 user=root Feb 12 22:35:32.310000 audit[9196]: USER_AUTH pid=9196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=130.162.42.103 addr=130.162.42.103 terminal=ssh res=failed' Feb 12 22:35:34.369862 systemd[1]: Started sshd@107-147.75.49.97:22-139.178.68.195:47524.service. Feb 12 22:35:34.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.49.97:22-139.178.68.195:47524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:34.396812 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 12 22:35:34.396863 kernel: audit: type=1130 audit(1707777334.369:2384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.49.97:22-139.178.68.195:47524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:34.511000 audit[9200]: USER_ACCT pid=9200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:34.511525 sshd[9200]: Accepted publickey for core from 139.178.68.195 port 47524 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:34.512888 sshd[9200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:34.515202 systemd-logind[1464]: New session 78 of user core. Feb 12 22:35:34.515738 systemd[1]: Started session-78.scope. Feb 12 22:35:34.532043 sshd[9196]: Failed password for root from 130.162.42.103 port 63580 ssh2 Feb 12 22:35:34.602558 sshd[9200]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:34.511000 audit[9200]: CRED_ACQ pid=9200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:34.603968 systemd[1]: sshd@107-147.75.49.97:22-139.178.68.195:47524.service: Deactivated successfully. Feb 12 22:35:34.604394 systemd[1]: session-78.scope: Deactivated successfully. Feb 12 22:35:34.604758 systemd-logind[1464]: Session 78 logged out. Waiting for processes to exit. Feb 12 22:35:34.605345 systemd-logind[1464]: Removed session 78. Feb 12 22:35:34.693394 kernel: audit: type=1101 audit(1707777334.511:2385): pid=9200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:34.693430 kernel: audit: type=1103 audit(1707777334.511:2386): pid=9200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:34.693446 kernel: audit: type=1006 audit(1707777334.511:2387): pid=9200 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=78 res=1 Feb 12 22:35:34.751995 kernel: audit: type=1300 audit(1707777334.511:2387): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc25226600 a2=3 a3=0 items=0 ppid=1 pid=9200 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:34.511000 audit[9200]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc25226600 a2=3 a3=0 items=0 ppid=1 pid=9200 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:34.843998 kernel: audit: type=1327 audit(1707777334.511:2387): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:34.511000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:34.516000 audit[9200]: USER_START pid=9200 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:34.874928 kernel: audit: type=1105 audit(1707777334.516:2388): pid=9200 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:34.517000 audit[9202]: CRED_ACQ pid=9202 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:35.058307 kernel: audit: type=1103 audit(1707777334.517:2389): pid=9202 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:35.058342 kernel: audit: type=1106 audit(1707777334.602:2390): pid=9200 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:34.602000 audit[9200]: USER_END pid=9200 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:35.153800 kernel: audit: type=1104 audit(1707777334.602:2391): pid=9200 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:34.602000 audit[9200]: CRED_DISP pid=9200 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:34.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.49.97:22-139.178.68.195:47524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:36.251781 sshd[9196]: Received disconnect from 130.162.42.103 port 63580:11: Bye Bye [preauth] Feb 12 22:35:36.251781 sshd[9196]: Disconnected from authenticating user root 130.162.42.103 port 63580 [preauth] Feb 12 22:35:36.254395 systemd[1]: sshd@106-147.75.49.97:22-130.162.42.103:63580.service: Deactivated successfully. Feb 12 22:35:36.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.49.97:22-130.162.42.103:63580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:39.612003 systemd[1]: Started sshd@108-147.75.49.97:22-139.178.68.195:43806.service. Feb 12 22:35:39.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.49.97:22-139.178.68.195:43806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:39.638777 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 22:35:39.638865 kernel: audit: type=1130 audit(1707777339.611:2394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.49.97:22-139.178.68.195:43806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:39.751000 audit[9230]: USER_ACCT pid=9230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:39.752281 sshd[9230]: Accepted publickey for core from 139.178.68.195 port 43806 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:39.753607 sshd[9230]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:39.755667 systemd-logind[1464]: New session 79 of user core. Feb 12 22:35:39.756345 systemd[1]: Started session-79.scope. Feb 12 22:35:39.752000 audit[9230]: CRED_ACQ pid=9230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:39.848166 sshd[9230]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:39.849564 systemd[1]: sshd@108-147.75.49.97:22-139.178.68.195:43806.service: Deactivated successfully. Feb 12 22:35:39.850055 systemd[1]: session-79.scope: Deactivated successfully. Feb 12 22:35:39.850452 systemd-logind[1464]: Session 79 logged out. Waiting for processes to exit. Feb 12 22:35:39.850872 systemd-logind[1464]: Removed session 79. Feb 12 22:35:39.936457 kernel: audit: type=1101 audit(1707777339.751:2395): pid=9230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:39.936503 kernel: audit: type=1103 audit(1707777339.752:2396): pid=9230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:39.936525 kernel: audit: type=1006 audit(1707777339.752:2397): pid=9230 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=79 res=1 Feb 12 22:35:39.752000 audit[9230]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc777313b0 a2=3 a3=0 items=0 ppid=1 pid=9230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:40.086992 kernel: audit: type=1300 audit(1707777339.752:2397): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc777313b0 a2=3 a3=0 items=0 ppid=1 pid=9230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:40.087032 kernel: audit: type=1327 audit(1707777339.752:2397): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:39.752000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:39.757000 audit[9230]: USER_START pid=9230 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:40.212019 kernel: audit: type=1105 audit(1707777339.757:2398): pid=9230 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:40.212052 kernel: audit: type=1103 audit(1707777339.758:2399): pid=9232 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:39.758000 audit[9232]: CRED_ACQ pid=9232 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:40.301204 kernel: audit: type=1106 audit(1707777339.847:2400): pid=9230 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:39.847000 audit[9230]: USER_END pid=9230 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:40.396681 kernel: audit: type=1104 audit(1707777339.847:2401): pid=9230 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:39.847000 audit[9230]: CRED_DISP pid=9230 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:39.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.49.97:22-139.178.68.195:43806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:44.858169 systemd[1]: Started sshd@109-147.75.49.97:22-139.178.68.195:43810.service. Feb 12 22:35:44.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.49.97:22-139.178.68.195:43810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:44.885166 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:35:44.885234 kernel: audit: type=1130 audit(1707777344.857:2403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.49.97:22-139.178.68.195:43810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:44.999000 audit[9275]: USER_ACCT pid=9275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:44.999807 sshd[9275]: Accepted publickey for core from 139.178.68.195 port 43810 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:45.001257 sshd[9275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:45.003692 systemd-logind[1464]: New session 80 of user core. Feb 12 22:35:45.004160 systemd[1]: Started session-80.scope. Feb 12 22:35:45.000000 audit[9275]: CRED_ACQ pid=9275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.099074 sshd[9275]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:45.100504 systemd[1]: sshd@109-147.75.49.97:22-139.178.68.195:43810.service: Deactivated successfully. Feb 12 22:35:45.100932 systemd[1]: session-80.scope: Deactivated successfully. Feb 12 22:35:45.101327 systemd-logind[1464]: Session 80 logged out. Waiting for processes to exit. Feb 12 22:35:45.101788 systemd-logind[1464]: Removed session 80. Feb 12 22:35:45.183295 kernel: audit: type=1101 audit(1707777344.999:2404): pid=9275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.183337 kernel: audit: type=1103 audit(1707777345.000:2405): pid=9275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.183357 kernel: audit: type=1006 audit(1707777345.000:2406): pid=9275 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=80 res=1 Feb 12 22:35:45.241895 kernel: audit: type=1300 audit(1707777345.000:2406): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5aaee910 a2=3 a3=0 items=0 ppid=1 pid=9275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:45.000000 audit[9275]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5aaee910 a2=3 a3=0 items=0 ppid=1 pid=9275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:45.334004 kernel: audit: type=1327 audit(1707777345.000:2406): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:45.000000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:45.364461 kernel: audit: type=1105 audit(1707777345.005:2407): pid=9275 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.005000 audit[9275]: USER_START pid=9275 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.403079 systemd[1]: Started sshd@110-147.75.49.97:22-121.224.115.232:47387.service. Feb 12 22:35:45.458927 kernel: audit: type=1103 audit(1707777345.005:2408): pid=9277 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.005000 audit[9277]: CRED_ACQ pid=9277 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.548116 kernel: audit: type=1106 audit(1707777345.098:2409): pid=9275 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.098000 audit[9275]: USER_END pid=9275 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.643610 kernel: audit: type=1104 audit(1707777345.098:2410): pid=9275 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.098000 audit[9275]: CRED_DISP pid=9275 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:45.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.49.97:22-139.178.68.195:43810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:45.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.49.97:22-121.224.115.232:47387 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:46.340554 sshd[9299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.224.115.232 user=root Feb 12 22:35:46.339000 audit[9299]: USER_AUTH pid=9299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.224.115.232 addr=121.224.115.232 terminal=ssh res=failed' Feb 12 22:35:48.035454 env[1477]: time="2024-02-12T22:35:48.035395374Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:35:48.036025 env[1477]: time="2024-02-12T22:35:48.035944686Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:35:48.036573 env[1477]: time="2024-02-12T22:35:48.036533320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:35:48.037498 env[1477]: time="2024-02-12T22:35:48.037457878Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:35:48.037640 env[1477]: time="2024-02-12T22:35:48.037594297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 22:35:48.037999 env[1477]: time="2024-02-12T22:35:48.037970939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 22:35:48.038866 env[1477]: time="2024-02-12T22:35:48.038852892Z" level=info msg="CreateContainer within sandbox \"810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 22:35:48.044214 env[1477]: time="2024-02-12T22:35:48.044168044Z" level=info msg="CreateContainer within sandbox \"810c9b031e91d08eb36017513a31bc58b24f72d99e6b94e18556e0362c13fda3\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5e7a8e42b651061aeb5f4974a1ef1f8cb63a71ed06eb4c40362854c128a2fc20\"" Feb 12 22:35:48.044527 env[1477]: time="2024-02-12T22:35:48.044486750Z" level=info msg="StartContainer for \"5e7a8e42b651061aeb5f4974a1ef1f8cb63a71ed06eb4c40362854c128a2fc20\"" Feb 12 22:35:48.054821 systemd[1]: Started cri-containerd-5e7a8e42b651061aeb5f4974a1ef1f8cb63a71ed06eb4c40362854c128a2fc20.scope. Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f9bfc262578 items=0 ppid=5121 pid=9333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:48.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376138653432623635313036316165623566343937346131656631 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit: BPF prog-id=187 op=LOAD Feb 12 22:35:48.061000 audit[9333]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000324868 items=0 ppid=5121 pid=9333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:48.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376138653432623635313036316165623566343937346131656631 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit: BPF prog-id=188 op=LOAD Feb 12 22:35:48.061000 audit[9333]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0003248b8 items=0 ppid=5121 pid=9333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:48.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376138653432623635313036316165623566343937346131656631 Feb 12 22:35:48.061000 audit: BPF prog-id=188 op=UNLOAD Feb 12 22:35:48.061000 audit: BPF prog-id=187 op=UNLOAD Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { perfmon } for pid=9333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit[9333]: AVC avc: denied { bpf } for pid=9333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:48.061000 audit: BPF prog-id=189 op=LOAD Feb 12 22:35:48.061000 audit[9333]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000324948 items=0 ppid=5121 pid=9333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:48.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376138653432623635313036316165623566343937346131656631 Feb 12 22:35:48.068165 env[1477]: time="2024-02-12T22:35:48.068141389Z" level=info msg="StartContainer for \"5e7a8e42b651061aeb5f4974a1ef1f8cb63a71ed06eb4c40362854c128a2fc20\" returns successfully" Feb 12 22:35:48.204187 kubelet[2597]: I0212 22:35:48.204133 2597 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 22:35:48.204187 kubelet[2597]: I0212 22:35:48.204204 2597 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 22:35:48.481266 sshd[9299]: Failed password for root from 121.224.115.232 port 47387 ssh2 Feb 12 22:35:48.599793 kubelet[2597]: I0212 22:35:48.599734 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-242vw" podStartSLOduration=-9.22337045425513e+09 pod.CreationTimestamp="2024-02-12 22:09:26 +0000 UTC" firstStartedPulling="2024-02-12 22:19:37.689750374 +0000 UTC m=+629.545776107" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:35:48.598805425 +0000 UTC m=+1600.454831203" watchObservedRunningTime="2024-02-12 22:35:48.599645428 +0000 UTC m=+1600.455671133" Feb 12 22:35:50.110750 systemd[1]: Started sshd@111-147.75.49.97:22-139.178.68.195:38336.service. Feb 12 22:35:50.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.49.97:22-139.178.68.195:38336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:50.138170 kernel: kauditd_printk_skb: 46 callbacks suppressed Feb 12 22:35:50.138256 kernel: audit: type=1130 audit(1707777350.110:2420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.49.97:22-139.178.68.195:38336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:50.251000 audit[9363]: USER_ACCT pid=9363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.251819 sshd[9363]: Accepted publickey for core from 139.178.68.195 port 38336 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:50.253043 sshd[9363]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:50.255492 systemd-logind[1464]: New session 81 of user core. Feb 12 22:35:50.256100 systemd[1]: Started session-81.scope. Feb 12 22:35:50.295428 sshd[9299]: Received disconnect from 121.224.115.232 port 47387:11: Bye Bye [preauth] Feb 12 22:35:50.295428 sshd[9299]: Disconnected from authenticating user root 121.224.115.232 port 47387 [preauth] Feb 12 22:35:50.295950 systemd[1]: sshd@110-147.75.49.97:22-121.224.115.232:47387.service: Deactivated successfully. Feb 12 22:35:50.342763 sshd[9363]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:50.251000 audit[9363]: CRED_ACQ pid=9363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.344024 systemd[1]: sshd@111-147.75.49.97:22-139.178.68.195:38336.service: Deactivated successfully. Feb 12 22:35:50.344437 systemd[1]: session-81.scope: Deactivated successfully. Feb 12 22:35:50.344787 systemd-logind[1464]: Session 81 logged out. Waiting for processes to exit. Feb 12 22:35:50.345327 systemd-logind[1464]: Removed session 81. Feb 12 22:35:50.433602 kernel: audit: type=1101 audit(1707777350.251:2421): pid=9363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.433641 kernel: audit: type=1103 audit(1707777350.251:2422): pid=9363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.433660 kernel: audit: type=1006 audit(1707777350.251:2423): pid=9363 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=81 res=1 Feb 12 22:35:50.492224 kernel: audit: type=1300 audit(1707777350.251:2423): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff991c270 a2=3 a3=0 items=0 ppid=1 pid=9363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:50.251000 audit[9363]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff991c270 a2=3 a3=0 items=0 ppid=1 pid=9363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:50.584407 kernel: audit: type=1327 audit(1707777350.251:2423): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:50.251000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:50.614935 kernel: audit: type=1105 audit(1707777350.257:2424): pid=9363 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.257000 audit[9363]: USER_START pid=9363 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.709451 kernel: audit: type=1103 audit(1707777350.257:2425): pid=9365 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.257000 audit[9365]: CRED_ACQ pid=9365 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.798783 kernel: audit: type=1131 audit(1707777350.295:2426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.49.97:22-121.224.115.232:47387 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:50.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.49.97:22-121.224.115.232:47387 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:50.887632 kernel: audit: type=1106 audit(1707777350.342:2427): pid=9363 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.342000 audit[9363]: USER_END pid=9363 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.342000 audit[9363]: CRED_DISP pid=9363 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:50.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.49.97:22-139.178.68.195:38336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:55.352085 systemd[1]: Started sshd@112-147.75.49.97:22-139.178.68.195:38350.service. Feb 12 22:35:55.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.49.97:22-139.178.68.195:38350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:55.378595 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 22:35:55.378638 kernel: audit: type=1130 audit(1707777355.351:2430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.49.97:22-139.178.68.195:38350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:55.492961 sshd[9393]: Accepted publickey for core from 139.178.68.195 port 38350 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:35:55.492000 audit[9393]: USER_ACCT pid=9393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:55.494254 sshd[9393]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:35:55.496485 systemd-logind[1464]: New session 82 of user core. Feb 12 22:35:55.497043 systemd[1]: Started session-82.scope. Feb 12 22:35:55.586222 sshd[9393]: pam_unix(sshd:session): session closed for user core Feb 12 22:35:55.493000 audit[9393]: CRED_ACQ pid=9393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:55.587529 systemd[1]: sshd@112-147.75.49.97:22-139.178.68.195:38350.service: Deactivated successfully. Feb 12 22:35:55.587979 systemd[1]: session-82.scope: Deactivated successfully. Feb 12 22:35:55.588409 systemd-logind[1464]: Session 82 logged out. Waiting for processes to exit. Feb 12 22:35:55.588849 systemd-logind[1464]: Removed session 82. Feb 12 22:35:55.678195 kernel: audit: type=1101 audit(1707777355.492:2431): pid=9393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:55.678236 kernel: audit: type=1103 audit(1707777355.493:2432): pid=9393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:55.678253 kernel: audit: type=1006 audit(1707777355.493:2433): pid=9393 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=82 res=1 Feb 12 22:35:55.737179 kernel: audit: type=1300 audit(1707777355.493:2433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc635b720 a2=3 a3=0 items=0 ppid=1 pid=9393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:55.493000 audit[9393]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc635b720 a2=3 a3=0 items=0 ppid=1 pid=9393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:55.493000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:55.829934 kernel: audit: type=1327 audit(1707777355.493:2433): proctitle=737368643A20636F7265205B707269765D Feb 12 22:35:55.497000 audit[9393]: USER_START pid=9393 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:55.955704 kernel: audit: type=1105 audit(1707777355.497:2434): pid=9393 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:55.955750 kernel: audit: type=1103 audit(1707777355.498:2435): pid=9395 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:55.498000 audit[9395]: CRED_ACQ pid=9395 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:56.045517 kernel: audit: type=1106 audit(1707777355.585:2436): pid=9393 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:55.585000 audit[9393]: USER_END pid=9393 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:56.141637 kernel: audit: type=1104 audit(1707777355.585:2437): pid=9393 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:55.585000 audit[9393]: CRED_DISP pid=9393 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:35:55.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.49.97:22-139.178.68.195:38350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:57.669794 systemd[1]: Started sshd@113-147.75.49.97:22-137.220.228.67:33782.service. Feb 12 22:35:57.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.49.97:22-137.220.228.67:33782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:35:58.220042 env[1477]: time="2024-02-12T22:35:58.220005663Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:35:58.220805 env[1477]: time="2024-02-12T22:35:58.220793829Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:35:58.221653 env[1477]: time="2024-02-12T22:35:58.221602751Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:35:58.222564 env[1477]: time="2024-02-12T22:35:58.222517224Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:35:58.223403 env[1477]: time="2024-02-12T22:35:58.223360041Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 22:35:58.224375 env[1477]: time="2024-02-12T22:35:58.224323882Z" level=info msg="CreateContainer within sandbox \"28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 22:35:58.228112 env[1477]: time="2024-02-12T22:35:58.228095433Z" level=info msg="CreateContainer within sandbox \"28bf3a91261d9eb26c1cc0cf09b9bc983fe8ed78466b896bd50e044bf687c102\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"05aba5ad9623e925149a83b1c4d7cc760e8bc101ca5a19874aa419e064fad0dc\"" Feb 12 22:35:58.228373 env[1477]: time="2024-02-12T22:35:58.228354892Z" level=info msg="StartContainer for \"05aba5ad9623e925149a83b1c4d7cc760e8bc101ca5a19874aa419e064fad0dc\"" Feb 12 22:35:58.238942 systemd[1]: Started cri-containerd-05aba5ad9623e925149a83b1c4d7cc760e8bc101ca5a19874aa419e064fad0dc.scope. Feb 12 22:35:58.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit: BPF prog-id=190 op=LOAD Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=7739 pid=9428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:58.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616261356164393632336539323531343961383362316334643763 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=7739 pid=9428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:58.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616261356164393632336539323531343961383362316334643763 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit: BPF prog-id=191 op=LOAD Feb 12 22:35:58.243000 audit[9428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ca490 items=0 ppid=7739 pid=9428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:58.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616261356164393632336539323531343961383362316334643763 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit: BPF prog-id=192 op=LOAD Feb 12 22:35:58.243000 audit[9428]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003ca4d8 items=0 ppid=7739 pid=9428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:58.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616261356164393632336539323531343961383362316334643763 Feb 12 22:35:58.243000 audit: BPF prog-id=192 op=UNLOAD Feb 12 22:35:58.243000 audit: BPF prog-id=191 op=UNLOAD Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { perfmon } for pid=9428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit[9428]: AVC avc: denied { bpf } for pid=9428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:35:58.243000 audit: BPF prog-id=193 op=LOAD Feb 12 22:35:58.243000 audit[9428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ca8e8 items=0 ppid=7739 pid=9428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:58.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616261356164393632336539323531343961383362316334643763 Feb 12 22:35:58.261622 env[1477]: time="2024-02-12T22:35:58.261600364Z" level=info msg="StartContainer for \"05aba5ad9623e925149a83b1c4d7cc760e8bc101ca5a19874aa419e064fad0dc\" returns successfully" Feb 12 22:35:58.289500 sshd[9419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.220.228.67 user=root Feb 12 22:35:58.288000 audit[9419]: USER_AUTH pid=9419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=137.220.228.67 addr=137.220.228.67 terminal=ssh res=failed' Feb 12 22:35:58.522000 audit[9439]: AVC avc: denied { watch } for pid=9439 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_32_37.3407379121/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c252 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c197,c252 tclass=file permissive=0 Feb 12 22:35:58.522000 audit[9439]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d76020 a2=fc6 a3=0 items=0 ppid=7739 pid=9439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c252 key=(null) Feb 12 22:35:58.522000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:35:58.622586 kubelet[2597]: I0212 22:35:58.622517 2597 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6ff4559b74-7g5df" podStartSLOduration=-9.223371833232372e+09 pod.CreationTimestamp="2024-02-12 22:32:35 +0000 UTC" firstStartedPulling="2024-02-12 22:32:37.930345605 +0000 UTC m=+1409.786371260" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:35:58.621405595 +0000 UTC m=+1610.477431336" watchObservedRunningTime="2024-02-12 22:35:58.622403439 +0000 UTC m=+1610.478429181" Feb 12 22:35:58.722000 audit[9496]: NETFILTER_CFG table=filter:132 family=2 entries=32 op=nft_register_rule pid=9496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:35:58.722000 audit[9496]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffe736b8e60 a2=0 a3=7ffe736b8e4c items=0 ppid=2903 pid=9496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:58.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:35:58.726000 audit[9496]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=9496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:35:58.726000 audit[9496]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe736b8e60 a2=0 a3=7ffe736b8e4c items=0 ppid=2903 pid=9496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:35:58.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:36:00.079335 sshd[9419]: Failed password for root from 137.220.228.67 port 33782 ssh2 Feb 12 22:36:00.295964 sshd[9419]: Received disconnect from 137.220.228.67 port 33782:11: Bye Bye [preauth] Feb 12 22:36:00.295964 sshd[9419]: Disconnected from authenticating user root 137.220.228.67 port 33782 [preauth] Feb 12 22:36:00.298500 systemd[1]: sshd@113-147.75.49.97:22-137.220.228.67:33782.service: Deactivated successfully. Feb 12 22:36:00.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.49.97:22-137.220.228.67:33782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:00.596791 systemd[1]: Started sshd@114-147.75.49.97:22-139.178.68.195:44868.service. Feb 12 22:36:00.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.49.97:22-139.178.68.195:44868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:00.623985 kernel: kauditd_printk_skb: 70 callbacks suppressed Feb 12 22:36:00.624061 kernel: audit: type=1130 audit(1707777360.595:2463): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.49.97:22-139.178.68.195:44868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:00.738000 audit[9499]: USER_ACCT pid=9499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:00.739286 sshd[9499]: Accepted publickey for core from 139.178.68.195 port 44868 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:00.742227 sshd[9499]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:00.744251 systemd-logind[1464]: New session 83 of user core. Feb 12 22:36:00.744755 systemd[1]: Started session-83.scope. Feb 12 22:36:00.830406 sshd[9499]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:00.741000 audit[9499]: CRED_ACQ pid=9499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:00.831691 systemd[1]: sshd@114-147.75.49.97:22-139.178.68.195:44868.service: Deactivated successfully. Feb 12 22:36:00.832125 systemd[1]: session-83.scope: Deactivated successfully. Feb 12 22:36:00.832535 systemd-logind[1464]: Session 83 logged out. Waiting for processes to exit. Feb 12 22:36:00.832935 systemd-logind[1464]: Removed session 83. Feb 12 22:36:00.922331 kernel: audit: type=1101 audit(1707777360.738:2464): pid=9499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:00.922372 kernel: audit: type=1103 audit(1707777360.741:2465): pid=9499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:00.922393 kernel: audit: type=1006 audit(1707777360.741:2466): pid=9499 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=83 res=1 Feb 12 22:36:00.741000 audit[9499]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc160914f0 a2=3 a3=0 items=0 ppid=1 pid=9499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:01.073882 kernel: audit: type=1300 audit(1707777360.741:2466): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc160914f0 a2=3 a3=0 items=0 ppid=1 pid=9499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:01.073915 kernel: audit: type=1327 audit(1707777360.741:2466): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:00.741000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:01.104607 kernel: audit: type=1105 audit(1707777360.745:2467): pid=9499 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:00.745000 audit[9499]: USER_START pid=9499 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:01.199696 kernel: audit: type=1103 audit(1707777360.746:2468): pid=9501 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:00.746000 audit[9501]: CRED_ACQ pid=9501 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:01.289005 kernel: audit: type=1106 audit(1707777360.830:2469): pid=9499 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:00.830000 audit[9499]: USER_END pid=9499 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:01.384539 kernel: audit: type=1104 audit(1707777360.830:2470): pid=9499 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:00.830000 audit[9499]: CRED_DISP pid=9499 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:00.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.49.97:22-139.178.68.195:44868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:01.618510 systemd[1]: Started sshd@115-147.75.49.97:22-43.155.157.138:53774.service. Feb 12 22:36:01.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.49.97:22-43.155.157.138:53774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:02.420154 sshd[9524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.157.138 user=root Feb 12 22:36:02.419000 audit[9524]: USER_AUTH pid=9524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.157.138 addr=43.155.157.138 terminal=ssh res=failed' Feb 12 22:36:04.085000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:04.085000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:04.085000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0024b88d0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:36:04.085000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:36:04.085000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001779260 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:36:04.085000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:36:04.426112 sshd[9524]: Failed password for root from 43.155.157.138 port 53774 ssh2 Feb 12 22:36:04.726000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:04.726000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c012e6fc20 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:36:04.726000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:36:04.726000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:04.726000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00bbdb140 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:36:04.726000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:36:04.726000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:04.726000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:04.726000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c014b60c60 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:36:04.726000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:36:04.726000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0117db440 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:36:04.726000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:36:04.726000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:04.726000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c009476700 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:36:04.726000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:36:04.726000 audit[2429]: AVC avc: denied { watch } for pid=2429 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:04.726000 audit[2429]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00a9e3ad0 a2=fc6 a3=0 items=0 ppid=2264 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c993 key=(null) Feb 12 22:36:04.726000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:36:05.154008 systemd[1]: Started sshd@116-147.75.49.97:22-43.140.199.211:44496.service. Feb 12 22:36:05.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.49.97:22-43.140.199.211:44496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:05.840399 systemd[1]: Started sshd@117-147.75.49.97:22-139.178.68.195:44882.service. Feb 12 22:36:05.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.97:22-139.178.68.195:44882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:05.867479 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 12 22:36:05.867551 kernel: audit: type=1130 audit(1707777365.839:2483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.97:22-139.178.68.195:44882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:05.980000 audit[9531]: USER_ACCT pid=9531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:05.982180 sshd[9531]: Accepted publickey for core from 139.178.68.195 port 44882 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:05.983647 sshd[9531]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:05.986370 systemd-logind[1464]: New session 84 of user core. Feb 12 22:36:05.986872 systemd[1]: Started session-84.scope. Feb 12 22:36:06.003824 sshd[9528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.140.199.211 user=root Feb 12 22:36:06.075081 sshd[9531]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:05.982000 audit[9531]: CRED_ACQ pid=9531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:06.076663 systemd[1]: sshd@117-147.75.49.97:22-139.178.68.195:44882.service: Deactivated successfully. Feb 12 22:36:06.077278 systemd[1]: session-84.scope: Deactivated successfully. Feb 12 22:36:06.077679 systemd-logind[1464]: Session 84 logged out. Waiting for processes to exit. Feb 12 22:36:06.078364 systemd-logind[1464]: Removed session 84. Feb 12 22:36:06.165998 kernel: audit: type=1101 audit(1707777365.980:2484): pid=9531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:06.166036 kernel: audit: type=1103 audit(1707777365.982:2485): pid=9531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:06.166051 kernel: audit: type=1006 audit(1707777365.982:2486): pid=9531 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=84 res=1 Feb 12 22:36:05.982000 audit[9531]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2037bc80 a2=3 a3=0 items=0 ppid=1 pid=9531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:06.316703 kernel: audit: type=1300 audit(1707777365.982:2486): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2037bc80 a2=3 a3=0 items=0 ppid=1 pid=9531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:06.316734 kernel: audit: type=1327 audit(1707777365.982:2486): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:05.982000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:06.347235 kernel: audit: type=1105 audit(1707777365.988:2487): pid=9531 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:05.988000 audit[9531]: USER_START pid=9531 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:06.358100 sshd[9524]: Received disconnect from 43.155.157.138 port 53774:11: Bye Bye [preauth] Feb 12 22:36:06.358100 sshd[9524]: Disconnected from authenticating user root 43.155.157.138 port 53774 [preauth] Feb 12 22:36:06.358631 systemd[1]: sshd@115-147.75.49.97:22-43.155.157.138:53774.service: Deactivated successfully. Feb 12 22:36:06.441772 kernel: audit: type=1103 audit(1707777365.988:2488): pid=9533 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:05.988000 audit[9533]: CRED_ACQ pid=9533 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:06.531007 kernel: audit: type=1100 audit(1707777366.002:2489): pid=9528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.140.199.211 addr=43.140.199.211 terminal=ssh res=failed' Feb 12 22:36:06.002000 audit[9528]: USER_AUTH pid=9528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.140.199.211 addr=43.140.199.211 terminal=ssh res=failed' Feb 12 22:36:06.619707 kernel: audit: type=1106 audit(1707777366.074:2490): pid=9531 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:06.074000 audit[9531]: USER_END pid=9531 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:06.075000 audit[9531]: CRED_DISP pid=9531 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:06.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.97:22-139.178.68.195:44882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:06.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.49.97:22-43.155.157.138:53774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:07.467000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:07.467000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a2ff20 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:36:07.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:36:07.468000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:07.468000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017792e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:36:07.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:36:07.468000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:07.468000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a2ff40 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:36:07.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:36:07.479000 audit[2428]: AVC avc: denied { watch } for pid=2428 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:36:07.479000 audit[2428]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f20780 a2=fc6 a3=0 items=0 ppid=2292 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c489 key=(null) Feb 12 22:36:07.479000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:36:07.758000 audit[9602]: NETFILTER_CFG table=filter:134 family=2 entries=31 op=nft_register_rule pid=9602 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:36:07.758000 audit[9602]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffcee8773f0 a2=0 a3=7ffcee8773dc items=0 ppid=2903 pid=9602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:07.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:36:07.758000 audit[9602]: NETFILTER_CFG table=nat:135 family=2 entries=85 op=nft_register_chain pid=9602 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:36:07.758000 audit[9602]: SYSCALL arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffcee8773f0 a2=0 a3=7ffcee8773dc items=0 ppid=2903 pid=9602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:07.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:36:08.225285 sshd[9528]: Failed password for root from 43.140.199.211 port 44496 ssh2 Feb 12 22:36:09.956564 sshd[9528]: Received disconnect from 43.140.199.211 port 44496:11: Bye Bye [preauth] Feb 12 22:36:09.956564 sshd[9528]: Disconnected from authenticating user root 43.140.199.211 port 44496 [preauth] Feb 12 22:36:09.957284 systemd[1]: sshd@116-147.75.49.97:22-43.140.199.211:44496.service: Deactivated successfully. Feb 12 22:36:09.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.49.97:22-43.140.199.211:44496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:11.087070 systemd[1]: Started sshd@118-147.75.49.97:22-139.178.68.195:59750.service. Feb 12 22:36:11.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.97:22-139.178.68.195:59750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:11.114655 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 12 22:36:11.114734 kernel: audit: type=1130 audit(1707777371.086:2501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.97:22-139.178.68.195:59750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:11.229000 audit[9607]: USER_ACCT pid=9607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.229880 sshd[9607]: Accepted publickey for core from 139.178.68.195 port 59750 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:11.231020 sshd[9607]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:11.233655 systemd-logind[1464]: New session 85 of user core. Feb 12 22:36:11.234104 systemd[1]: Started session-85.scope. Feb 12 22:36:11.321420 sshd[9607]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:11.229000 audit[9607]: CRED_ACQ pid=9607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.322889 systemd[1]: sshd@118-147.75.49.97:22-139.178.68.195:59750.service: Deactivated successfully. Feb 12 22:36:11.323340 systemd[1]: session-85.scope: Deactivated successfully. Feb 12 22:36:11.323724 systemd-logind[1464]: Session 85 logged out. Waiting for processes to exit. Feb 12 22:36:11.324271 systemd-logind[1464]: Removed session 85. Feb 12 22:36:11.412752 kernel: audit: type=1101 audit(1707777371.229:2502): pid=9607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.412791 kernel: audit: type=1103 audit(1707777371.229:2503): pid=9607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.412808 kernel: audit: type=1006 audit(1707777371.229:2504): pid=9607 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=85 res=1 Feb 12 22:36:11.471667 kernel: audit: type=1300 audit(1707777371.229:2504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4e9e19c0 a2=3 a3=0 items=0 ppid=1 pid=9607 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:11.229000 audit[9607]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4e9e19c0 a2=3 a3=0 items=0 ppid=1 pid=9607 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:11.564190 kernel: audit: type=1327 audit(1707777371.229:2504): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:11.229000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:11.594937 kernel: audit: type=1105 audit(1707777371.236:2505): pid=9607 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.236000 audit[9607]: USER_START pid=9607 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.689986 kernel: audit: type=1103 audit(1707777371.236:2506): pid=9609 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.236000 audit[9609]: CRED_ACQ pid=9609 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.321000 audit[9607]: USER_END pid=9607 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.875883 kernel: audit: type=1106 audit(1707777371.321:2507): pid=9607 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.875967 kernel: audit: type=1104 audit(1707777371.321:2508): pid=9607 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.321000 audit[9607]: CRED_DISP pid=9607 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:11.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.97:22-139.178.68.195:59750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:16.331527 systemd[1]: Started sshd@119-147.75.49.97:22-139.178.68.195:54018.service. Feb 12 22:36:16.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.97:22-139.178.68.195:54018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:16.358663 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:36:16.358767 kernel: audit: type=1130 audit(1707777376.330:2510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.97:22-139.178.68.195:54018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:16.473000 audit[9673]: USER_ACCT pid=9673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:16.475318 sshd[9673]: Accepted publickey for core from 139.178.68.195 port 54018 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:16.478233 sshd[9673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:16.488023 systemd-logind[1464]: New session 86 of user core. Feb 12 22:36:16.490305 systemd[1]: Started session-86.scope. Feb 12 22:36:16.476000 audit[9673]: CRED_ACQ pid=9673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:16.577347 sshd[9673]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:16.578647 systemd[1]: sshd@119-147.75.49.97:22-139.178.68.195:54018.service: Deactivated successfully. Feb 12 22:36:16.579087 systemd[1]: session-86.scope: Deactivated successfully. Feb 12 22:36:16.579492 systemd-logind[1464]: Session 86 logged out. Waiting for processes to exit. Feb 12 22:36:16.580025 systemd-logind[1464]: Removed session 86. Feb 12 22:36:16.658737 kernel: audit: type=1101 audit(1707777376.473:2511): pid=9673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:16.658778 kernel: audit: type=1103 audit(1707777376.476:2512): pid=9673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:16.658796 kernel: audit: type=1006 audit(1707777376.476:2513): pid=9673 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=86 res=1 Feb 12 22:36:16.717677 kernel: audit: type=1300 audit(1707777376.476:2513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4eed7da0 a2=3 a3=0 items=0 ppid=1 pid=9673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:16.476000 audit[9673]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4eed7da0 a2=3 a3=0 items=0 ppid=1 pid=9673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:16.810179 kernel: audit: type=1327 audit(1707777376.476:2513): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:16.476000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:16.840926 kernel: audit: type=1105 audit(1707777376.497:2514): pid=9673 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:16.497000 audit[9673]: USER_START pid=9673 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:16.499000 audit[9675]: CRED_ACQ pid=9675 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:17.025454 kernel: audit: type=1103 audit(1707777376.499:2515): pid=9675 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:17.025488 kernel: audit: type=1106 audit(1707777376.577:2516): pid=9673 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:16.577000 audit[9673]: USER_END pid=9673 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:17.121125 kernel: audit: type=1104 audit(1707777376.577:2517): pid=9673 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:16.577000 audit[9673]: CRED_DISP pid=9673 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:16.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.97:22-139.178.68.195:54018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:17.460536 systemd[1]: Started sshd@120-147.75.49.97:22-200.1.219.138:57342.service. Feb 12 22:36:17.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.49.97:22-200.1.219.138:57342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:18.676217 sshd[9724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.1.219.138 user=root Feb 12 22:36:18.675000 audit[9724]: USER_AUTH pid=9724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=200.1.219.138 addr=200.1.219.138 terminal=ssh res=failed' Feb 12 22:36:20.877169 sshd[9724]: Failed password for root from 200.1.219.138 port 57342 ssh2 Feb 12 22:36:21.121828 systemd[1]: Started sshd@121-147.75.49.97:22-121.224.115.232:51632.service. Feb 12 22:36:21.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.49.97:22-121.224.115.232:51632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:21.580372 systemd[1]: Started sshd@122-147.75.49.97:22-139.178.68.195:54026.service. Feb 12 22:36:21.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.97:22-139.178.68.195:54026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:21.606851 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 22:36:21.606965 kernel: audit: type=1130 audit(1707777381.579:2522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.97:22-139.178.68.195:54026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:21.720000 audit[9730]: USER_ACCT pid=9730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:21.721346 sshd[9730]: Accepted publickey for core from 139.178.68.195 port 54026 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:21.724374 sshd[9730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:21.730014 systemd-logind[1464]: New session 87 of user core. Feb 12 22:36:21.731322 systemd[1]: Started session-87.scope. Feb 12 22:36:21.741661 systemd[1]: Started sshd@123-147.75.49.97:22-201.20.104.238:47558.service. Feb 12 22:36:21.722000 audit[9730]: CRED_ACQ pid=9730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:21.821090 sshd[9730]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:21.822532 systemd[1]: sshd@122-147.75.49.97:22-139.178.68.195:54026.service: Deactivated successfully. Feb 12 22:36:21.822984 systemd[1]: session-87.scope: Deactivated successfully. Feb 12 22:36:21.823398 systemd-logind[1464]: Session 87 logged out. Waiting for processes to exit. Feb 12 22:36:21.823893 systemd-logind[1464]: Removed session 87. Feb 12 22:36:21.903194 kernel: audit: type=1101 audit(1707777381.720:2523): pid=9730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:21.903237 kernel: audit: type=1103 audit(1707777381.722:2524): pid=9730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:21.903255 kernel: audit: type=1006 audit(1707777381.722:2525): pid=9730 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=87 res=1 Feb 12 22:36:21.961799 kernel: audit: type=1300 audit(1707777381.722:2525): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5f8dfa20 a2=3 a3=0 items=0 ppid=1 pid=9730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:21.722000 audit[9730]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5f8dfa20 a2=3 a3=0 items=0 ppid=1 pid=9730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:22.039747 sshd[9727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.224.115.232 user=root Feb 12 22:36:22.053862 kernel: audit: type=1327 audit(1707777381.722:2525): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:21.722000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:22.084389 kernel: audit: type=1130 audit(1707777381.740:2526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.97:22-201.20.104.238:47558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:21.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.97:22-201.20.104.238:47558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:22.172309 kernel: audit: type=1105 audit(1707777381.743:2527): pid=9730 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:21.743000 audit[9730]: USER_START pid=9730 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:22.267674 kernel: audit: type=1103 audit(1707777381.744:2528): pid=9734 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:21.744000 audit[9734]: CRED_ACQ pid=9734 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:22.356961 kernel: audit: type=1106 audit(1707777381.820:2529): pid=9730 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:21.820000 audit[9730]: USER_END pid=9730 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:21.820000 audit[9730]: CRED_DISP pid=9730 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:21.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.97:22-139.178.68.195:54026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:22.038000 audit[9727]: USER_AUTH pid=9727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.224.115.232 addr=121.224.115.232 terminal=ssh res=failed' Feb 12 22:36:22.697552 sshd[9724]: Received disconnect from 200.1.219.138 port 57342:11: Bye Bye [preauth] Feb 12 22:36:22.697552 sshd[9724]: Disconnected from authenticating user root 200.1.219.138 port 57342 [preauth] Feb 12 22:36:22.699897 systemd[1]: sshd@120-147.75.49.97:22-200.1.219.138:57342.service: Deactivated successfully. Feb 12 22:36:22.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.49.97:22-200.1.219.138:57342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:22.837321 sshd[9733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.104.238 user=root Feb 12 22:36:22.836000 audit[9733]: USER_AUTH pid=9733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=201.20.104.238 addr=201.20.104.238 terminal=ssh res=failed' Feb 12 22:36:23.789207 sshd[9727]: Failed password for root from 121.224.115.232 port 51632 ssh2 Feb 12 22:36:24.106134 sshd[9727]: Received disconnect from 121.224.115.232 port 51632:11: Bye Bye [preauth] Feb 12 22:36:24.106134 sshd[9727]: Disconnected from authenticating user root 121.224.115.232 port 51632 [preauth] Feb 12 22:36:24.108560 systemd[1]: sshd@121-147.75.49.97:22-121.224.115.232:51632.service: Deactivated successfully. Feb 12 22:36:24.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.49.97:22-121.224.115.232:51632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:24.586434 sshd[9733]: Failed password for root from 201.20.104.238 port 47558 ssh2 Feb 12 22:36:24.916550 sshd[9733]: Received disconnect from 201.20.104.238 port 47558:11: Bye Bye [preauth] Feb 12 22:36:24.916550 sshd[9733]: Disconnected from authenticating user root 201.20.104.238 port 47558 [preauth] Feb 12 22:36:24.919079 systemd[1]: sshd@123-147.75.49.97:22-201.20.104.238:47558.service: Deactivated successfully. Feb 12 22:36:24.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.97:22-201.20.104.238:47558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:25.287244 systemd[1]: Started sshd@124-147.75.49.97:22-130.162.42.103:25414.service. Feb 12 22:36:25.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.49.97:22-130.162.42.103:25414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:26.143699 sshd[9762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.42.103 user=root Feb 12 22:36:26.143000 audit[9762]: USER_AUTH pid=9762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=130.162.42.103 addr=130.162.42.103 terminal=ssh res=failed' Feb 12 22:36:26.831645 systemd[1]: Started sshd@125-147.75.49.97:22-139.178.68.195:40620.service. Feb 12 22:36:26.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.97:22-139.178.68.195:40620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:26.858934 kernel: kauditd_printk_skb: 9 callbacks suppressed Feb 12 22:36:26.858987 kernel: audit: type=1130 audit(1707777386.830:2539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.97:22-139.178.68.195:40620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:26.973000 audit[9766]: USER_ACCT pid=9766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:26.974392 sshd[9766]: Accepted publickey for core from 139.178.68.195 port 40620 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:26.977643 sshd[9766]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:26.982610 systemd-logind[1464]: New session 88 of user core. Feb 12 22:36:26.983182 systemd[1]: Started session-88.scope. Feb 12 22:36:27.058971 sshd[9766]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:27.060357 systemd[1]: sshd@125-147.75.49.97:22-139.178.68.195:40620.service: Deactivated successfully. Feb 12 22:36:27.060801 systemd[1]: session-88.scope: Deactivated successfully. Feb 12 22:36:27.061161 systemd-logind[1464]: Session 88 logged out. Waiting for processes to exit. Feb 12 22:36:27.061762 systemd-logind[1464]: Removed session 88. Feb 12 22:36:27.065984 kernel: audit: type=1101 audit(1707777386.973:2540): pid=9766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:27.066018 kernel: audit: type=1103 audit(1707777386.975:2541): pid=9766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:26.975000 audit[9766]: CRED_ACQ pid=9766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:27.156929 kernel: audit: type=1006 audit(1707777386.975:2542): pid=9766 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=88 res=1 Feb 12 22:36:26.975000 audit[9766]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecb71c9f0 a2=3 a3=0 items=0 ppid=1 pid=9766 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:27.308489 kernel: audit: type=1300 audit(1707777386.975:2542): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecb71c9f0 a2=3 a3=0 items=0 ppid=1 pid=9766 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:27.308522 kernel: audit: type=1327 audit(1707777386.975:2542): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:26.975000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:27.339160 kernel: audit: type=1105 audit(1707777386.984:2543): pid=9766 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:26.984000 audit[9766]: USER_START pid=9766 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:27.434115 kernel: audit: type=1103 audit(1707777386.985:2544): pid=9768 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:26.985000 audit[9768]: CRED_ACQ pid=9768 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:27.523793 kernel: audit: type=1106 audit(1707777387.058:2545): pid=9766 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:27.058000 audit[9766]: USER_END pid=9766 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:27.619771 kernel: audit: type=1104 audit(1707777387.058:2546): pid=9766 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:27.058000 audit[9766]: CRED_DISP pid=9766 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:27.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.97:22-139.178.68.195:40620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:27.778360 sshd[9762]: Failed password for root from 130.162.42.103 port 25414 ssh2 Feb 12 22:36:28.189268 sshd[9762]: Received disconnect from 130.162.42.103 port 25414:11: Bye Bye [preauth] Feb 12 22:36:28.189268 sshd[9762]: Disconnected from authenticating user root 130.162.42.103 port 25414 [preauth] Feb 12 22:36:28.191532 systemd[1]: sshd@124-147.75.49.97:22-130.162.42.103:25414.service: Deactivated successfully. Feb 12 22:36:28.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.49.97:22-130.162.42.103:25414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:32.068388 systemd[1]: Started sshd@126-147.75.49.97:22-139.178.68.195:40630.service. Feb 12 22:36:32.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.97:22-139.178.68.195:40630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:32.095372 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 22:36:32.095444 kernel: audit: type=1130 audit(1707777392.067:2549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.97:22-139.178.68.195:40630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:32.129679 systemd[1]: Started sshd@127-147.75.49.97:22-43.140.199.211:50898.service. Feb 12 22:36:32.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.97:22-43.140.199.211:50898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:32.274222 kernel: audit: type=1130 audit(1707777392.128:2550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.97:22-43.140.199.211:50898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:32.298000 audit[9792]: USER_ACCT pid=9792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.300540 sshd[9792]: Accepted publickey for core from 139.178.68.195 port 40630 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:32.304328 sshd[9792]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:32.309022 systemd-logind[1464]: New session 89 of user core. Feb 12 22:36:32.310070 systemd[1]: Started session-89.scope. Feb 12 22:36:32.302000 audit[9792]: CRED_ACQ pid=9792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.483241 kernel: audit: type=1101 audit(1707777392.298:2551): pid=9792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.483279 kernel: audit: type=1103 audit(1707777392.302:2552): pid=9792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.483297 kernel: audit: type=1006 audit(1707777392.302:2553): pid=9792 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=89 res=1 Feb 12 22:36:32.542153 kernel: audit: type=1300 audit(1707777392.302:2553): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd93abb210 a2=3 a3=0 items=0 ppid=1 pid=9792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:32.302000 audit[9792]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd93abb210 a2=3 a3=0 items=0 ppid=1 pid=9792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:32.634708 kernel: audit: type=1327 audit(1707777392.302:2553): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:32.302000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:32.635004 sshd[9792]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:32.636735 systemd[1]: sshd@126-147.75.49.97:22-139.178.68.195:40630.service: Deactivated successfully. Feb 12 22:36:32.637169 systemd[1]: session-89.scope: Deactivated successfully. Feb 12 22:36:32.637580 systemd-logind[1464]: Session 89 logged out. Waiting for processes to exit. Feb 12 22:36:32.638130 systemd-logind[1464]: Removed session 89. Feb 12 22:36:32.665399 kernel: audit: type=1105 audit(1707777392.311:2554): pid=9792 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.311000 audit[9792]: USER_START pid=9792 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.760803 kernel: audit: type=1103 audit(1707777392.312:2555): pid=9797 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.312000 audit[9797]: CRED_ACQ pid=9797 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.850079 kernel: audit: type=1106 audit(1707777392.634:2556): pid=9792 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.634000 audit[9792]: USER_END pid=9792 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.634000 audit[9792]: CRED_DISP pid=9792 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:32.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.97:22-139.178.68.195:40630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:33.073354 sshd[9795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.140.199.211 user=root Feb 12 22:36:33.072000 audit[9795]: USER_AUTH pid=9795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.140.199.211 addr=43.140.199.211 terminal=ssh res=failed' Feb 12 22:36:35.334210 sshd[9795]: Failed password for root from 43.140.199.211 port 50898 ssh2 Feb 12 22:36:37.025855 sshd[9795]: Received disconnect from 43.140.199.211 port 50898:11: Bye Bye [preauth] Feb 12 22:36:37.025855 sshd[9795]: Disconnected from authenticating user root 43.140.199.211 port 50898 [preauth] Feb 12 22:36:37.028462 systemd[1]: sshd@127-147.75.49.97:22-43.140.199.211:50898.service: Deactivated successfully. Feb 12 22:36:37.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.97:22-43.140.199.211:50898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:37.585594 systemd[1]: Started sshd@128-147.75.49.97:22-139.178.68.195:37106.service. Feb 12 22:36:37.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.97:22-139.178.68.195:37106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:37.613004 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 22:36:37.613043 kernel: audit: type=1130 audit(1707777397.584:2561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.97:22-139.178.68.195:37106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:37.727000 audit[9821]: USER_ACCT pid=9821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:37.728902 sshd[9821]: Accepted publickey for core from 139.178.68.195 port 37106 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:37.730265 sshd[9821]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:37.733121 systemd-logind[1464]: New session 90 of user core. Feb 12 22:36:37.734201 systemd[1]: Started session-90.scope. Feb 12 22:36:37.815465 sshd[9821]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:37.816895 systemd[1]: sshd@128-147.75.49.97:22-139.178.68.195:37106.service: Deactivated successfully. Feb 12 22:36:37.817320 systemd[1]: session-90.scope: Deactivated successfully. Feb 12 22:36:37.817653 systemd-logind[1464]: Session 90 logged out. Waiting for processes to exit. Feb 12 22:36:37.818040 systemd-logind[1464]: Removed session 90. Feb 12 22:36:37.729000 audit[9821]: CRED_ACQ pid=9821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:37.912723 kernel: audit: type=1101 audit(1707777397.727:2562): pid=9821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:37.912793 kernel: audit: type=1103 audit(1707777397.729:2563): pid=9821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:37.912810 kernel: audit: type=1006 audit(1707777397.729:2564): pid=9821 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=90 res=1 Feb 12 22:36:37.971636 kernel: audit: type=1300 audit(1707777397.729:2564): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc740a8ef0 a2=3 a3=0 items=0 ppid=1 pid=9821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:37.729000 audit[9821]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc740a8ef0 a2=3 a3=0 items=0 ppid=1 pid=9821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:38.064123 kernel: audit: type=1327 audit(1707777397.729:2564): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:37.729000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:38.094792 kernel: audit: type=1105 audit(1707777397.736:2565): pid=9821 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:37.736000 audit[9821]: USER_START pid=9821 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:38.189822 kernel: audit: type=1103 audit(1707777397.736:2566): pid=9843 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:37.736000 audit[9843]: CRED_ACQ pid=9843 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:38.279577 kernel: audit: type=1106 audit(1707777397.815:2567): pid=9821 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:37.815000 audit[9821]: USER_END pid=9821 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:38.375606 kernel: audit: type=1104 audit(1707777397.815:2568): pid=9821 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:37.815000 audit[9821]: CRED_DISP pid=9821 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:37.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.97:22-139.178.68.195:37106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:42.819111 systemd[1]: Started sshd@129-147.75.49.97:22-139.178.68.195:37114.service. Feb 12 22:36:42.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.97:22-139.178.68.195:37114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:42.846541 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:36:42.846613 kernel: audit: type=1130 audit(1707777402.818:2570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.97:22-139.178.68.195:37114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:42.961000 audit[9886]: USER_ACCT pid=9886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:42.961463 sshd[9886]: Accepted publickey for core from 139.178.68.195 port 37114 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:42.963470 sshd[9886]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:42.965976 systemd-logind[1464]: New session 91 of user core. Feb 12 22:36:42.966643 systemd[1]: Started session-91.scope. Feb 12 22:36:43.044222 sshd[9886]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:43.045683 systemd[1]: sshd@129-147.75.49.97:22-139.178.68.195:37114.service: Deactivated successfully. Feb 12 22:36:43.046132 systemd[1]: session-91.scope: Deactivated successfully. Feb 12 22:36:43.046519 systemd-logind[1464]: Session 91 logged out. Waiting for processes to exit. Feb 12 22:36:43.046917 systemd-logind[1464]: Removed session 91. Feb 12 22:36:42.962000 audit[9886]: CRED_ACQ pid=9886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:43.143494 kernel: audit: type=1101 audit(1707777402.961:2571): pid=9886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:43.143535 kernel: audit: type=1103 audit(1707777402.962:2572): pid=9886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:43.143553 kernel: audit: type=1006 audit(1707777402.962:2573): pid=9886 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=91 res=1 Feb 12 22:36:43.202417 kernel: audit: type=1300 audit(1707777402.962:2573): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2bc1a00 a2=3 a3=0 items=0 ppid=1 pid=9886 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:42.962000 audit[9886]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2bc1a00 a2=3 a3=0 items=0 ppid=1 pid=9886 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:43.294895 kernel: audit: type=1327 audit(1707777402.962:2573): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:42.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:43.325576 kernel: audit: type=1105 audit(1707777402.968:2574): pid=9886 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:42.968000 audit[9886]: USER_START pid=9886 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:43.420647 kernel: audit: type=1103 audit(1707777402.968:2575): pid=9888 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:42.968000 audit[9888]: CRED_ACQ pid=9888 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:43.509896 kernel: audit: type=1106 audit(1707777403.044:2576): pid=9886 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:43.044000 audit[9886]: USER_END pid=9886 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:43.605419 kernel: audit: type=1104 audit(1707777403.044:2577): pid=9886 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:43.044000 audit[9886]: CRED_DISP pid=9886 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:43.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.97:22-139.178.68.195:37114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:48.053853 systemd[1]: Started sshd@130-147.75.49.97:22-139.178.68.195:47190.service. Feb 12 22:36:48.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.97:22-139.178.68.195:47190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:48.080802 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:36:48.080873 kernel: audit: type=1130 audit(1707777408.053:2579): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.97:22-139.178.68.195:47190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:48.194000 audit[9937]: USER_ACCT pid=9937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.195225 sshd[9937]: Accepted publickey for core from 139.178.68.195 port 47190 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:48.196783 sshd[9937]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:48.199350 systemd-logind[1464]: New session 92 of user core. Feb 12 22:36:48.199901 systemd[1]: Started session-92.scope. Feb 12 22:36:48.279635 sshd[9937]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:48.281044 systemd[1]: sshd@130-147.75.49.97:22-139.178.68.195:47190.service: Deactivated successfully. Feb 12 22:36:48.281495 systemd[1]: session-92.scope: Deactivated successfully. Feb 12 22:36:48.281882 systemd-logind[1464]: Session 92 logged out. Waiting for processes to exit. Feb 12 22:36:48.282356 systemd-logind[1464]: Removed session 92. Feb 12 22:36:48.195000 audit[9937]: CRED_ACQ pid=9937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.379052 kernel: audit: type=1101 audit(1707777408.194:2580): pid=9937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.379098 kernel: audit: type=1103 audit(1707777408.195:2581): pid=9937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.379117 kernel: audit: type=1006 audit(1707777408.195:2582): pid=9937 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=92 res=1 Feb 12 22:36:48.437639 kernel: audit: type=1300 audit(1707777408.195:2582): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6caf9090 a2=3 a3=0 items=0 ppid=1 pid=9937 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:48.195000 audit[9937]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6caf9090 a2=3 a3=0 items=0 ppid=1 pid=9937 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:48.529720 kernel: audit: type=1327 audit(1707777408.195:2582): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:48.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:48.560223 kernel: audit: type=1105 audit(1707777408.201:2583): pid=9937 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.201000 audit[9937]: USER_START pid=9937 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.654985 kernel: audit: type=1103 audit(1707777408.202:2584): pid=9939 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.202000 audit[9939]: CRED_ACQ pid=9939 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.744273 kernel: audit: type=1106 audit(1707777408.279:2585): pid=9937 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.279000 audit[9937]: USER_END pid=9937 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.839901 kernel: audit: type=1104 audit(1707777408.279:2586): pid=9937 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.279000 audit[9937]: CRED_DISP pid=9937 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:48.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.97:22-139.178.68.195:47190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:53.289612 systemd[1]: Started sshd@131-147.75.49.97:22-139.178.68.195:47194.service. Feb 12 22:36:53.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-147.75.49.97:22-139.178.68.195:47194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:53.316487 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:36:53.316510 kernel: audit: type=1130 audit(1707777413.288:2588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-147.75.49.97:22-139.178.68.195:47194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:36:53.430000 audit[9979]: USER_ACCT pid=9979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.431128 sshd[9979]: Accepted publickey for core from 139.178.68.195 port 47194 ssh2: RSA SHA256:VONhvD+62JjJJlyaCnCLOi14kvYyMVCHIRWbkl6IJU4 Feb 12 22:36:53.432225 sshd[9979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:36:53.434542 systemd-logind[1464]: New session 93 of user core. Feb 12 22:36:53.435018 systemd[1]: Started session-93.scope. Feb 12 22:36:53.513367 sshd[9979]: pam_unix(sshd:session): session closed for user core Feb 12 22:36:53.514687 systemd[1]: sshd@131-147.75.49.97:22-139.178.68.195:47194.service: Deactivated successfully. Feb 12 22:36:53.515141 systemd[1]: session-93.scope: Deactivated successfully. Feb 12 22:36:53.515530 systemd-logind[1464]: Session 93 logged out. Waiting for processes to exit. Feb 12 22:36:53.515962 systemd-logind[1464]: Removed session 93. Feb 12 22:36:53.431000 audit[9979]: CRED_ACQ pid=9979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.613194 kernel: audit: type=1101 audit(1707777413.430:2589): pid=9979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.613242 kernel: audit: type=1103 audit(1707777413.431:2590): pid=9979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.613257 kernel: audit: type=1006 audit(1707777413.431:2591): pid=9979 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=93 res=1 Feb 12 22:36:53.671870 kernel: audit: type=1300 audit(1707777413.431:2591): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb5298cc0 a2=3 a3=0 items=0 ppid=1 pid=9979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:53.431000 audit[9979]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb5298cc0 a2=3 a3=0 items=0 ppid=1 pid=9979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:36:53.763996 kernel: audit: type=1327 audit(1707777413.431:2591): proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:53.431000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:36:53.436000 audit[9979]: USER_START pid=9979 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.889180 kernel: audit: type=1105 audit(1707777413.436:2592): pid=9979 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.889212 kernel: audit: type=1103 audit(1707777413.436:2593): pid=9981 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.436000 audit[9981]: CRED_ACQ pid=9981 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.978489 kernel: audit: type=1106 audit(1707777413.513:2594): pid=9979 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.513000 audit[9979]: USER_END pid=9979 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.513000 audit[9979]: CRED_DISP pid=9979 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:54.074999 kernel: audit: type=1104 audit(1707777413.513:2595): pid=9979 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 22:36:53.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-147.75.49.97:22-139.178.68.195:47194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'