Feb 13 01:33:14.551295 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 01:33:14.551307 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 01:33:14.551314 kernel: BIOS-provided physical RAM map: Feb 13 01:33:14.551318 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 01:33:14.551322 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 01:33:14.551326 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 01:33:14.551330 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 01:33:14.551334 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 01:33:14.551338 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000820dcfff] usable Feb 13 01:33:14.551342 kernel: BIOS-e820: [mem 0x00000000820dd000-0x00000000820ddfff] ACPI NVS Feb 13 01:33:14.551347 kernel: BIOS-e820: [mem 0x00000000820de000-0x00000000820defff] reserved Feb 13 01:33:14.551350 kernel: BIOS-e820: [mem 0x00000000820df000-0x000000008afccfff] usable Feb 13 01:33:14.551354 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 13 01:33:14.551358 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 13 01:33:14.551363 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 13 01:33:14.551368 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 13 01:33:14.551372 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 13 01:33:14.551376 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 13 01:33:14.551380 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 01:33:14.551384 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 01:33:14.551388 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 01:33:14.551392 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 01:33:14.551396 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 01:33:14.551401 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 13 01:33:14.551405 kernel: NX (Execute Disable) protection: active Feb 13 01:33:14.551409 kernel: SMBIOS 3.2.1 present. Feb 13 01:33:14.551414 kernel: DMI: Supermicro X11SCM-F/X11SCM-F, BIOS 1.9 09/16/2022 Feb 13 01:33:14.551418 kernel: tsc: Detected 3400.000 MHz processor Feb 13 01:33:14.551422 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 01:33:14.551426 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 01:33:14.551431 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 01:33:14.551435 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 13 01:33:14.551440 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 01:33:14.551444 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 13 01:33:14.551448 kernel: Using GB pages for direct mapping Feb 13 01:33:14.551453 kernel: ACPI: Early table checksum verification disabled Feb 13 01:33:14.551458 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 01:33:14.551462 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 01:33:14.551466 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 13 01:33:14.551471 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 01:33:14.551477 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 13 01:33:14.551481 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 13 01:33:14.551487 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 13 01:33:14.551491 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 01:33:14.551496 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 01:33:14.551501 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 01:33:14.551505 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 01:33:14.551510 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 01:33:14.551514 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 01:33:14.551519 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 01:33:14.551524 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 01:33:14.551529 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 01:33:14.551534 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 01:33:14.551538 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 01:33:14.551543 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 01:33:14.551547 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 01:33:14.551552 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 01:33:14.551557 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 01:33:14.551562 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 01:33:14.551567 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 13 01:33:14.551571 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 01:33:14.551576 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 01:33:14.551580 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 01:33:14.551585 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 13 01:33:14.551590 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 01:33:14.551594 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 01:33:14.551599 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 01:33:14.551604 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 01:33:14.551609 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 01:33:14.551616 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 13 01:33:14.551621 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 13 01:33:14.551625 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 13 01:33:14.551630 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 13 01:33:14.551635 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 13 01:33:14.551639 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 13 01:33:14.551645 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 13 01:33:14.551649 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 13 01:33:14.551654 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 13 01:33:14.551659 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 13 01:33:14.551663 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 13 01:33:14.551668 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 13 01:33:14.551672 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 13 01:33:14.551677 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 13 01:33:14.551681 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 13 01:33:14.551687 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 13 01:33:14.551692 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 13 01:33:14.551696 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 13 01:33:14.551701 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 13 01:33:14.551705 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 13 01:33:14.551710 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 13 01:33:14.551714 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 13 01:33:14.551719 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 13 01:33:14.551724 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 13 01:33:14.551729 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 13 01:33:14.551733 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 13 01:33:14.551738 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 13 01:33:14.551743 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 13 01:33:14.551747 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 13 01:33:14.551752 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 13 01:33:14.551756 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 13 01:33:14.551761 kernel: No NUMA configuration found Feb 13 01:33:14.551766 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 13 01:33:14.551771 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 13 01:33:14.551776 kernel: Zone ranges: Feb 13 01:33:14.551780 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 01:33:14.551785 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 01:33:14.551790 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 13 01:33:14.551794 kernel: Movable zone start for each node Feb 13 01:33:14.551799 kernel: Early memory node ranges Feb 13 01:33:14.551803 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 01:33:14.551808 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 01:33:14.551813 kernel: node 0: [mem 0x0000000040400000-0x00000000820dcfff] Feb 13 01:33:14.551818 kernel: node 0: [mem 0x00000000820df000-0x000000008afccfff] Feb 13 01:33:14.551823 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 13 01:33:14.551827 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 13 01:33:14.551832 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 13 01:33:14.551836 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 13 01:33:14.551841 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 01:33:14.551849 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 01:33:14.551855 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 01:33:14.551860 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 01:33:14.551865 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 13 01:33:14.551870 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 13 01:33:14.551875 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 13 01:33:14.551880 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 13 01:33:14.551885 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 01:33:14.551890 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 01:33:14.551895 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 01:33:14.551900 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 01:33:14.551906 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 01:33:14.551911 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 01:33:14.551915 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 01:33:14.551920 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 01:33:14.551925 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 01:33:14.551930 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 01:33:14.551935 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 01:33:14.551940 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 01:33:14.551945 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 01:33:14.551951 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 01:33:14.551956 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 01:33:14.551960 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 01:33:14.551965 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 01:33:14.551970 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 01:33:14.551975 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 01:33:14.551980 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 01:33:14.551985 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 01:33:14.551990 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 01:33:14.551996 kernel: TSC deadline timer available Feb 13 01:33:14.552001 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 01:33:14.552006 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 13 01:33:14.552011 kernel: Booting paravirtualized kernel on bare hardware Feb 13 01:33:14.552016 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 01:33:14.552021 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 01:33:14.552026 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 01:33:14.552031 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 01:33:14.552035 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 01:33:14.552041 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 13 01:33:14.552046 kernel: Policy zone: Normal Feb 13 01:33:14.552051 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 01:33:14.552057 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 01:33:14.552062 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 01:33:14.552067 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 01:33:14.552072 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 01:33:14.552077 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 01:33:14.552083 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 01:33:14.552088 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 01:33:14.552093 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 01:33:14.552097 kernel: rcu: Hierarchical RCU implementation. Feb 13 01:33:14.552103 kernel: rcu: RCU event tracing is enabled. Feb 13 01:33:14.552108 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 01:33:14.552113 kernel: Rude variant of Tasks RCU enabled. Feb 13 01:33:14.552118 kernel: Tracing variant of Tasks RCU enabled. Feb 13 01:33:14.552123 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 01:33:14.552129 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 01:33:14.552134 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 01:33:14.552138 kernel: random: crng init done Feb 13 01:33:14.552143 kernel: Console: colour dummy device 80x25 Feb 13 01:33:14.552148 kernel: printk: console [tty0] enabled Feb 13 01:33:14.552153 kernel: printk: console [ttyS1] enabled Feb 13 01:33:14.552158 kernel: ACPI: Core revision 20210730 Feb 13 01:33:14.552163 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 13 01:33:14.552168 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 01:33:14.552174 kernel: DMAR: Host address width 39 Feb 13 01:33:14.552179 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 01:33:14.552184 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 01:33:14.552188 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 13 01:33:14.552193 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 13 01:33:14.552198 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 01:33:14.552203 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 01:33:14.552208 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 01:33:14.552213 kernel: x2apic enabled Feb 13 01:33:14.552219 kernel: Switched APIC routing to cluster x2apic. Feb 13 01:33:14.552224 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 01:33:14.552229 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 01:33:14.552234 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 01:33:14.552239 kernel: process: using mwait in idle threads Feb 13 01:33:14.552244 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 01:33:14.552249 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 01:33:14.552253 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 01:33:14.552258 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 01:33:14.552264 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 01:33:14.552269 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 01:33:14.552274 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 01:33:14.552279 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 01:33:14.552284 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 01:33:14.552289 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 01:33:14.552294 kernel: TAA: Mitigation: TSX disabled Feb 13 01:33:14.552298 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 01:33:14.552303 kernel: SRBDS: Mitigation: Microcode Feb 13 01:33:14.552308 kernel: GDS: Vulnerable: No microcode Feb 13 01:33:14.552313 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 01:33:14.552319 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 01:33:14.552324 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 01:33:14.552329 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 01:33:14.552334 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 01:33:14.552338 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 01:33:14.552343 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 01:33:14.552348 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 01:33:14.552353 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 01:33:14.552358 kernel: Freeing SMP alternatives memory: 32K Feb 13 01:33:14.552363 kernel: pid_max: default: 32768 minimum: 301 Feb 13 01:33:14.552367 kernel: LSM: Security Framework initializing Feb 13 01:33:14.552372 kernel: SELinux: Initializing. Feb 13 01:33:14.552378 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 01:33:14.552383 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 01:33:14.552388 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 01:33:14.552393 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 01:33:14.552398 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 01:33:14.552403 kernel: ... version: 4 Feb 13 01:33:14.552407 kernel: ... bit width: 48 Feb 13 01:33:14.552412 kernel: ... generic registers: 4 Feb 13 01:33:14.552417 kernel: ... value mask: 0000ffffffffffff Feb 13 01:33:14.552422 kernel: ... max period: 00007fffffffffff Feb 13 01:33:14.552428 kernel: ... fixed-purpose events: 3 Feb 13 01:33:14.552433 kernel: ... event mask: 000000070000000f Feb 13 01:33:14.552438 kernel: signal: max sigframe size: 2032 Feb 13 01:33:14.552443 kernel: rcu: Hierarchical SRCU implementation. Feb 13 01:33:14.552448 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 01:33:14.552452 kernel: smp: Bringing up secondary CPUs ... Feb 13 01:33:14.552457 kernel: x86: Booting SMP configuration: Feb 13 01:33:14.552462 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 01:33:14.552467 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 01:33:14.552473 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 01:33:14.552478 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 01:33:14.552483 kernel: smpboot: Max logical packages: 1 Feb 13 01:33:14.552488 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 01:33:14.552493 kernel: devtmpfs: initialized Feb 13 01:33:14.552498 kernel: x86/mm: Memory block size: 128MB Feb 13 01:33:14.552503 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x820dd000-0x820ddfff] (4096 bytes) Feb 13 01:33:14.552508 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 13 01:33:14.552514 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 01:33:14.552519 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 01:33:14.552524 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 01:33:14.552529 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 01:33:14.552534 kernel: audit: initializing netlink subsys (disabled) Feb 13 01:33:14.552539 kernel: audit: type=2000 audit(1707787989.040:1): state=initialized audit_enabled=0 res=1 Feb 13 01:33:14.552543 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 01:33:14.552548 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 01:33:14.552553 kernel: cpuidle: using governor menu Feb 13 01:33:14.552559 kernel: ACPI: bus type PCI registered Feb 13 01:33:14.552564 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 01:33:14.552569 kernel: dca service started, version 1.12.1 Feb 13 01:33:14.552574 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 01:33:14.552579 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 01:33:14.552584 kernel: PCI: Using configuration type 1 for base access Feb 13 01:33:14.552589 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 01:33:14.552594 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 01:33:14.552599 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 01:33:14.552605 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 01:33:14.552609 kernel: ACPI: Added _OSI(Module Device) Feb 13 01:33:14.552616 kernel: ACPI: Added _OSI(Processor Device) Feb 13 01:33:14.552621 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 01:33:14.552626 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 01:33:14.552631 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 01:33:14.552636 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 01:33:14.552641 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 01:33:14.552646 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 01:33:14.552651 kernel: ACPI: Dynamic OEM Table Load: Feb 13 01:33:14.552656 kernel: ACPI: SSDT 0xFFFF9D2880213E00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 01:33:14.552661 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 01:33:14.552666 kernel: ACPI: Dynamic OEM Table Load: Feb 13 01:33:14.552671 kernel: ACPI: SSDT 0xFFFF9D2881AE6400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 01:33:14.552676 kernel: ACPI: Dynamic OEM Table Load: Feb 13 01:33:14.552681 kernel: ACPI: SSDT 0xFFFF9D2881A55000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 01:33:14.552686 kernel: ACPI: Dynamic OEM Table Load: Feb 13 01:33:14.552691 kernel: ACPI: SSDT 0xFFFF9D2881A52000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 01:33:14.552696 kernel: ACPI: Dynamic OEM Table Load: Feb 13 01:33:14.552701 kernel: ACPI: SSDT 0xFFFF9D288014C000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 01:33:14.552706 kernel: ACPI: Dynamic OEM Table Load: Feb 13 01:33:14.552711 kernel: ACPI: SSDT 0xFFFF9D2881AE5800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 01:33:14.552716 kernel: ACPI: Interpreter enabled Feb 13 01:33:14.552721 kernel: ACPI: PM: (supports S0 S5) Feb 13 01:33:14.552726 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 01:33:14.552731 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 01:33:14.552736 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 01:33:14.552741 kernel: HEST: Table parsing has been initialized. Feb 13 01:33:14.552746 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 01:33:14.552751 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 01:33:14.552756 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 01:33:14.552761 kernel: ACPI: PM: Power Resource [USBC] Feb 13 01:33:14.552766 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 01:33:14.552771 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 01:33:14.552776 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 01:33:14.552781 kernel: ACPI: PM: Power Resource [WRST] Feb 13 01:33:14.552786 kernel: ACPI: PM: Power Resource [FN00] Feb 13 01:33:14.552791 kernel: ACPI: PM: Power Resource [FN01] Feb 13 01:33:14.552796 kernel: ACPI: PM: Power Resource [FN02] Feb 13 01:33:14.552801 kernel: ACPI: PM: Power Resource [FN03] Feb 13 01:33:14.552806 kernel: ACPI: PM: Power Resource [FN04] Feb 13 01:33:14.552811 kernel: ACPI: PM: Power Resource [PIN] Feb 13 01:33:14.552816 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 01:33:14.552879 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 01:33:14.552924 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 01:33:14.552967 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 01:33:14.552974 kernel: PCI host bridge to bus 0000:00 Feb 13 01:33:14.553016 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 01:33:14.553053 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 01:33:14.553089 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 01:33:14.553125 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 13 01:33:14.553160 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 01:33:14.553198 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 01:33:14.553248 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 01:33:14.553297 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 01:33:14.553340 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 01:33:14.553384 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 01:33:14.553427 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 13 01:33:14.553473 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 01:33:14.553517 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 13 01:33:14.553562 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 01:33:14.553604 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 13 01:33:14.553650 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 01:33:14.553697 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 01:33:14.553741 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 13 01:33:14.553781 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 13 01:33:14.553827 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 01:33:14.553868 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 01:33:14.553917 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 01:33:14.553958 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 01:33:14.554003 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 01:33:14.554045 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 13 01:33:14.554086 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 01:33:14.554131 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 01:33:14.554172 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 13 01:33:14.554213 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 01:33:14.554257 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 01:33:14.554300 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 13 01:33:14.554339 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 01:33:14.554383 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 01:33:14.554424 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 13 01:33:14.554464 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 13 01:33:14.554505 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 13 01:33:14.554545 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 13 01:33:14.554593 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 13 01:33:14.554638 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 13 01:33:14.554679 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 01:33:14.554724 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 01:33:14.554767 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 01:33:14.554812 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 01:33:14.554854 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 01:33:14.554904 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 01:33:14.554945 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 01:33:14.554991 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 01:33:14.555033 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 01:33:14.555079 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 13 01:33:14.555136 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 13 01:33:14.555179 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 01:33:14.555220 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 01:33:14.555265 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 01:33:14.555312 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 01:33:14.555353 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 13 01:33:14.555394 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 01:33:14.555439 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 01:33:14.555479 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 01:33:14.555526 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 01:33:14.555571 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 01:33:14.555615 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 13 01:33:14.555657 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 13 01:33:14.555699 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 01:33:14.555741 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 01:33:14.555787 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 01:33:14.555829 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 01:33:14.555873 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 13 01:33:14.555914 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 13 01:33:14.555956 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 01:33:14.555998 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 01:33:14.556040 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 01:33:14.556080 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 01:33:14.556120 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 01:33:14.556161 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 01:33:14.556209 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 13 01:33:14.556252 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 13 01:33:14.556294 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 01:33:14.556336 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 13 01:33:14.556378 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 13 01:33:14.556419 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 01:33:14.556459 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 01:33:14.556502 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 01:33:14.556548 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 01:33:14.556590 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 13 01:33:14.556671 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 01:33:14.556715 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 13 01:33:14.556758 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 01:33:14.556800 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 01:33:14.556841 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 01:33:14.556883 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 01:33:14.556924 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 01:33:14.556970 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 01:33:14.557013 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 13 01:33:14.557055 kernel: pci 0000:06:00.0: supports D1 D2 Feb 13 01:33:14.557097 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 01:33:14.557139 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 01:33:14.557179 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 01:33:14.557222 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 01:33:14.557299 kernel: pci_bus 0000:07: extended config space not accessible Feb 13 01:33:14.557368 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 01:33:14.557412 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 13 01:33:14.557457 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 13 01:33:14.557500 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 01:33:14.557545 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 01:33:14.557590 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 01:33:14.557637 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 01:33:14.557680 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 01:33:14.557722 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 01:33:14.557764 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 01:33:14.557771 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 01:33:14.557777 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 01:33:14.557783 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 01:33:14.557788 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 01:33:14.557794 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 01:33:14.557799 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 01:33:14.557804 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 01:33:14.557809 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 01:33:14.557814 kernel: iommu: Default domain type: Translated Feb 13 01:33:14.557819 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 01:33:14.557862 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 13 01:33:14.557907 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 01:33:14.557952 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 13 01:33:14.557959 kernel: vgaarb: loaded Feb 13 01:33:14.557964 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 01:33:14.557970 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 01:33:14.557975 kernel: PTP clock support registered Feb 13 01:33:14.557980 kernel: PCI: Using ACPI for IRQ routing Feb 13 01:33:14.557985 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 01:33:14.557990 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 01:33:14.557997 kernel: e820: reserve RAM buffer [mem 0x820dd000-0x83ffffff] Feb 13 01:33:14.558002 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 13 01:33:14.558007 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 13 01:33:14.558012 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 13 01:33:14.558017 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 13 01:33:14.558022 kernel: clocksource: Switched to clocksource tsc-early Feb 13 01:33:14.558027 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 01:33:14.558033 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 01:33:14.558038 kernel: pnp: PnP ACPI init Feb 13 01:33:14.558081 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 01:33:14.558123 kernel: pnp 00:02: [dma 0 disabled] Feb 13 01:33:14.558162 kernel: pnp 00:03: [dma 0 disabled] Feb 13 01:33:14.558203 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 01:33:14.558241 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 01:33:14.558281 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 01:33:14.558323 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 01:33:14.558360 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 01:33:14.558396 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 01:33:14.558434 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 01:33:14.558469 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 01:33:14.558506 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 01:33:14.558542 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 01:33:14.558580 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 01:33:14.558624 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 01:33:14.558662 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 01:33:14.558698 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 01:33:14.558735 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 01:33:14.558771 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 01:33:14.558807 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 01:33:14.558845 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 01:33:14.558884 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 01:33:14.558892 kernel: pnp: PnP ACPI: found 10 devices Feb 13 01:33:14.558897 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 01:33:14.558903 kernel: NET: Registered PF_INET protocol family Feb 13 01:33:14.558908 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 01:33:14.558913 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 01:33:14.558919 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 01:33:14.558925 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 01:33:14.558930 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 01:33:14.558936 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 01:33:14.558941 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 01:33:14.558946 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 01:33:14.558951 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 01:33:14.558957 kernel: NET: Registered PF_XDP protocol family Feb 13 01:33:14.558998 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 13 01:33:14.559040 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 13 01:33:14.559082 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 13 01:33:14.559123 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 01:33:14.559166 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 01:33:14.559208 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 01:33:14.559249 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 01:33:14.559291 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 01:33:14.559331 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 01:33:14.559373 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 01:33:14.559414 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 01:33:14.559456 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 01:33:14.559497 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 01:33:14.559538 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 01:33:14.559580 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 01:33:14.559623 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 01:33:14.559665 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 01:33:14.559705 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 01:33:14.559748 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 01:33:14.559790 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 01:33:14.559833 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 01:33:14.559875 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 01:33:14.559916 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 01:33:14.559959 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 01:33:14.559995 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 01:33:14.560032 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 01:33:14.560067 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 01:33:14.560102 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 01:33:14.560137 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 13 01:33:14.560171 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 01:33:14.560214 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 13 01:33:14.560254 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 01:33:14.560297 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 13 01:33:14.560335 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 13 01:33:14.560376 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 13 01:33:14.560414 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 13 01:33:14.560456 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 13 01:33:14.560496 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 13 01:33:14.560537 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 01:33:14.560576 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 13 01:33:14.560583 kernel: PCI: CLS 64 bytes, default 64 Feb 13 01:33:14.560589 kernel: DMAR: No ATSR found Feb 13 01:33:14.560594 kernel: DMAR: No SATC found Feb 13 01:33:14.560599 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 01:33:14.560642 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 01:33:14.560686 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 01:33:14.560726 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 13 01:33:14.560767 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 13 01:33:14.560808 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 13 01:33:14.560848 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 13 01:33:14.560888 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 13 01:33:14.560927 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 13 01:33:14.560969 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 13 01:33:14.561010 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 13 01:33:14.561050 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 13 01:33:14.561090 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 13 01:33:14.561131 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 13 01:33:14.561172 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 13 01:33:14.561212 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 13 01:33:14.561253 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 13 01:33:14.561293 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 13 01:33:14.561335 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 13 01:33:14.561375 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 13 01:33:14.561416 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 13 01:33:14.561456 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 13 01:33:14.561499 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 13 01:33:14.561540 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 13 01:33:14.561581 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 13 01:33:14.561646 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 01:33:14.561708 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 13 01:33:14.561753 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 13 01:33:14.561761 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 01:33:14.561766 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 01:33:14.561771 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 13 01:33:14.561777 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 13 01:33:14.561782 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 01:33:14.561787 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 01:33:14.561794 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 01:33:14.561836 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 01:33:14.561844 kernel: Initialise system trusted keyrings Feb 13 01:33:14.561849 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 01:33:14.561855 kernel: Key type asymmetric registered Feb 13 01:33:14.561860 kernel: Asymmetric key parser 'x509' registered Feb 13 01:33:14.561865 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 01:33:14.561870 kernel: io scheduler mq-deadline registered Feb 13 01:33:14.561876 kernel: io scheduler kyber registered Feb 13 01:33:14.561882 kernel: io scheduler bfq registered Feb 13 01:33:14.561922 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 13 01:33:14.561963 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 13 01:33:14.562004 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 13 01:33:14.562044 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 13 01:33:14.562084 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 13 01:33:14.562125 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 13 01:33:14.562172 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 01:33:14.562180 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 01:33:14.562186 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 01:33:14.562191 kernel: pstore: Registered erst as persistent store backend Feb 13 01:33:14.562196 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 01:33:14.562201 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 01:33:14.562207 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 01:33:14.562212 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 01:33:14.562218 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 13 01:33:14.562262 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 01:33:14.562270 kernel: i8042: PNP: No PS/2 controller found. Feb 13 01:33:14.562307 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 01:33:14.562345 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 01:33:14.562382 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T01:33:13 UTC (1707787993) Feb 13 01:33:14.562420 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 01:33:14.562427 kernel: fail to initialize ptp_kvm Feb 13 01:33:14.562434 kernel: intel_pstate: Intel P-state driver initializing Feb 13 01:33:14.562439 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 01:33:14.562444 kernel: intel_pstate: HWP enabled Feb 13 01:33:14.562449 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 01:33:14.562455 kernel: vesafb: scrolling: redraw Feb 13 01:33:14.562460 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 01:33:14.562465 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000aaf5987f, using 768k, total 768k Feb 13 01:33:14.562470 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 01:33:14.562475 kernel: fb0: VESA VGA frame buffer device Feb 13 01:33:14.562481 kernel: NET: Registered PF_INET6 protocol family Feb 13 01:33:14.562486 kernel: Segment Routing with IPv6 Feb 13 01:33:14.562491 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 01:33:14.562497 kernel: NET: Registered PF_PACKET protocol family Feb 13 01:33:14.562502 kernel: Key type dns_resolver registered Feb 13 01:33:14.562507 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 01:33:14.562512 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 01:33:14.562517 kernel: IPI shorthand broadcast: enabled Feb 13 01:33:14.562522 kernel: sched_clock: Marking stable (1678000413, 1338967846)->(4436215978, -1419247719) Feb 13 01:33:14.562528 kernel: registered taskstats version 1 Feb 13 01:33:14.562534 kernel: Loading compiled-in X.509 certificates Feb 13 01:33:14.562539 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 01:33:14.562544 kernel: Key type .fscrypt registered Feb 13 01:33:14.562549 kernel: Key type fscrypt-provisioning registered Feb 13 01:33:14.562554 kernel: pstore: Using crash dump compression: deflate Feb 13 01:33:14.562559 kernel: ima: Allocated hash algorithm: sha1 Feb 13 01:33:14.562564 kernel: ima: No architecture policies found Feb 13 01:33:14.562570 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 01:33:14.562576 kernel: Write protecting the kernel read-only data: 28672k Feb 13 01:33:14.562581 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 01:33:14.562586 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 01:33:14.562591 kernel: Run /init as init process Feb 13 01:33:14.562596 kernel: with arguments: Feb 13 01:33:14.562601 kernel: /init Feb 13 01:33:14.562607 kernel: with environment: Feb 13 01:33:14.562613 kernel: HOME=/ Feb 13 01:33:14.562619 kernel: TERM=linux Feb 13 01:33:14.562624 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 01:33:14.562631 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 01:33:14.562637 systemd[1]: Detected architecture x86-64. Feb 13 01:33:14.562643 systemd[1]: Running in initrd. Feb 13 01:33:14.562648 systemd[1]: No hostname configured, using default hostname. Feb 13 01:33:14.562653 systemd[1]: Hostname set to . Feb 13 01:33:14.562659 systemd[1]: Initializing machine ID from random generator. Feb 13 01:33:14.562665 systemd[1]: Queued start job for default target initrd.target. Feb 13 01:33:14.562670 systemd[1]: Started systemd-ask-password-console.path. Feb 13 01:33:14.562676 systemd[1]: Reached target cryptsetup.target. Feb 13 01:33:14.562681 systemd[1]: Reached target paths.target. Feb 13 01:33:14.562686 systemd[1]: Reached target slices.target. Feb 13 01:33:14.562692 systemd[1]: Reached target swap.target. Feb 13 01:33:14.562697 systemd[1]: Reached target timers.target. Feb 13 01:33:14.562702 systemd[1]: Listening on iscsid.socket. Feb 13 01:33:14.562709 systemd[1]: Listening on iscsiuio.socket. Feb 13 01:33:14.562714 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 01:33:14.562720 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 01:33:14.562725 systemd[1]: Listening on systemd-journald.socket. Feb 13 01:33:14.562730 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Feb 13 01:33:14.562736 systemd[1]: Listening on systemd-networkd.socket. Feb 13 01:33:14.562741 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Feb 13 01:33:14.562746 kernel: clocksource: Switched to clocksource tsc Feb 13 01:33:14.562752 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 01:33:14.562758 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 01:33:14.562763 systemd[1]: Reached target sockets.target. Feb 13 01:33:14.562769 systemd[1]: Starting kmod-static-nodes.service... Feb 13 01:33:14.562774 systemd[1]: Finished network-cleanup.service. Feb 13 01:33:14.562779 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 01:33:14.562785 systemd[1]: Starting systemd-journald.service... Feb 13 01:33:14.562790 systemd[1]: Starting systemd-modules-load.service... Feb 13 01:33:14.562797 systemd-journald[268]: Journal started Feb 13 01:33:14.562823 systemd-journald[268]: Runtime Journal (/run/log/journal/afc070eb5354413794e9a9605c4f11b1) is 8.0M, max 640.1M, 632.1M free. Feb 13 01:33:14.566128 systemd-modules-load[269]: Inserted module 'overlay' Feb 13 01:33:14.625709 kernel: audit: type=1334 audit(1707787994.571:2): prog-id=6 op=LOAD Feb 13 01:33:14.625720 systemd[1]: Starting systemd-resolved.service... Feb 13 01:33:14.625728 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 01:33:14.571000 audit: BPF prog-id=6 op=LOAD Feb 13 01:33:14.656646 kernel: Bridge firewalling registered Feb 13 01:33:14.656661 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 01:33:14.671897 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 13 01:33:14.707707 systemd[1]: Started systemd-journald.service. Feb 13 01:33:14.707719 kernel: SCSI subsystem initialized Feb 13 01:33:14.677840 systemd-resolved[271]: Positive Trust Anchors: Feb 13 01:33:14.826878 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 01:33:14.826904 kernel: audit: type=1130 audit(1707787994.727:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:14.826912 kernel: device-mapper: uevent: version 1.0.3 Feb 13 01:33:14.826919 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 01:33:14.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:14.677847 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 01:33:14.877154 kernel: audit: type=1130 audit(1707787994.833:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:14.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:14.677867 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 01:33:14.951815 kernel: audit: type=1130 audit(1707787994.884:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:14.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:14.679416 systemd-resolved[271]: Defaulting to hostname 'linux'. Feb 13 01:33:14.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:14.729249 systemd[1]: Started systemd-resolved.service. Feb 13 01:33:15.049252 kernel: audit: type=1130 audit(1707787994.951:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:15.049262 kernel: audit: type=1130 audit(1707787995.004:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:15.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:14.829137 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 13 01:33:15.103582 kernel: audit: type=1130 audit(1707787995.057:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:15.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:14.854904 systemd[1]: Finished kmod-static-nodes.service. Feb 13 01:33:14.885874 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 01:33:14.952014 systemd[1]: Finished systemd-modules-load.service. Feb 13 01:33:15.004917 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 01:33:15.057868 systemd[1]: Reached target nss-lookup.target. Feb 13 01:33:15.112225 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 01:33:15.133216 systemd[1]: Starting systemd-sysctl.service... Feb 13 01:33:15.133505 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 01:33:15.136324 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 01:33:15.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:15.136831 systemd[1]: Finished systemd-sysctl.service. Feb 13 01:33:15.185666 kernel: audit: type=1130 audit(1707787995.134:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:15.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:15.198941 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 01:33:15.263678 kernel: audit: type=1130 audit(1707787995.198:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:15.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:15.255201 systemd[1]: Starting dracut-cmdline.service... Feb 13 01:33:15.278732 dracut-cmdline[295]: dracut-dracut-053 Feb 13 01:33:15.278732 dracut-cmdline[295]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 01:33:15.278732 dracut-cmdline[295]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 01:33:15.344678 kernel: Loading iSCSI transport class v2.0-870. Feb 13 01:33:15.344689 kernel: iscsi: registered transport (tcp) Feb 13 01:33:15.394079 kernel: iscsi: registered transport (qla4xxx) Feb 13 01:33:15.394132 kernel: QLogic iSCSI HBA Driver Feb 13 01:33:15.410313 systemd[1]: Finished dracut-cmdline.service. Feb 13 01:33:15.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:15.419398 systemd[1]: Starting dracut-pre-udev.service... Feb 13 01:33:15.474650 kernel: raid6: avx2x4 gen() 48972 MB/s Feb 13 01:33:15.509692 kernel: raid6: avx2x4 xor() 21852 MB/s Feb 13 01:33:15.544646 kernel: raid6: avx2x2 gen() 53838 MB/s Feb 13 01:33:15.579693 kernel: raid6: avx2x2 xor() 32116 MB/s Feb 13 01:33:15.614691 kernel: raid6: avx2x1 gen() 45256 MB/s Feb 13 01:33:15.648681 kernel: raid6: avx2x1 xor() 27919 MB/s Feb 13 01:33:15.682690 kernel: raid6: sse2x4 gen() 21350 MB/s Feb 13 01:33:15.716687 kernel: raid6: sse2x4 xor() 11982 MB/s Feb 13 01:33:15.750690 kernel: raid6: sse2x2 gen() 21687 MB/s Feb 13 01:33:15.784654 kernel: raid6: sse2x2 xor() 13453 MB/s Feb 13 01:33:15.818646 kernel: raid6: sse2x1 gen() 18295 MB/s Feb 13 01:33:15.870054 kernel: raid6: sse2x1 xor() 8930 MB/s Feb 13 01:33:15.870069 kernel: raid6: using algorithm avx2x2 gen() 53838 MB/s Feb 13 01:33:15.870076 kernel: raid6: .... xor() 32116 MB/s, rmw enabled Feb 13 01:33:15.888004 kernel: raid6: using avx2x2 recovery algorithm Feb 13 01:33:15.933616 kernel: xor: automatically using best checksumming function avx Feb 13 01:33:16.011646 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 01:33:16.016964 systemd[1]: Finished dracut-pre-udev.service. Feb 13 01:33:16.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:16.025000 audit: BPF prog-id=7 op=LOAD Feb 13 01:33:16.025000 audit: BPF prog-id=8 op=LOAD Feb 13 01:33:16.026557 systemd[1]: Starting systemd-udevd.service... Feb 13 01:33:16.034018 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 13 01:33:16.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:16.039756 systemd[1]: Started systemd-udevd.service. Feb 13 01:33:16.079741 dracut-pre-trigger[486]: rd.md=0: removing MD RAID activation Feb 13 01:33:16.055308 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 01:33:16.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:16.081095 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 01:33:16.096643 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 01:33:16.145684 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 01:33:16.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:16.172875 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 01:33:16.209112 kernel: ACPI: bus type USB registered Feb 13 01:33:16.209148 kernel: usbcore: registered new interface driver usbfs Feb 13 01:33:16.209157 kernel: usbcore: registered new interface driver hub Feb 13 01:33:16.226758 kernel: usbcore: registered new device driver usb Feb 13 01:33:16.244682 kernel: libata version 3.00 loaded. Feb 13 01:33:16.284076 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 01:33:16.284112 kernel: AES CTR mode by8 optimization enabled Feb 13 01:33:16.319670 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 01:33:16.319693 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 01:33:16.320623 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Feb 13 01:33:16.357851 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 01:33:16.358620 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 01:33:16.369653 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 01:33:16.369729 kernel: pps pps0: new PPS source ptp0 Feb 13 01:33:16.369790 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 13 01:33:16.369844 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 01:33:16.387617 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 01:33:16.387693 kernel: scsi host0: ahci Feb 13 01:33:16.387763 kernel: scsi host1: ahci Feb 13 01:33:16.387822 kernel: scsi host2: ahci Feb 13 01:33:16.387883 kernel: scsi host3: ahci Feb 13 01:33:16.387945 kernel: scsi host4: ahci Feb 13 01:33:16.388005 kernel: scsi host5: ahci Feb 13 01:33:16.388065 kernel: scsi host6: ahci Feb 13 01:33:16.388184 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132 Feb 13 01:33:16.388191 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132 Feb 13 01:33:16.388200 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132 Feb 13 01:33:16.388206 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132 Feb 13 01:33:16.388212 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132 Feb 13 01:33:16.388219 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132 Feb 13 01:33:16.388225 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132 Feb 13 01:33:16.410572 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 13 01:33:16.448034 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 01:33:16.448111 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 01:33:16.460897 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 01:33:16.460965 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6b:0a:d0 Feb 13 01:33:16.473333 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 13 01:33:16.473403 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 01:33:16.485293 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 01:33:16.543398 kernel: pps pps1: new PPS source ptp1 Feb 13 01:33:16.543469 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 01:33:16.543523 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 13 01:33:16.571498 kernel: hub 1-0:1.0: USB hub found Feb 13 01:33:16.571578 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 01:33:16.571637 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6b:0a:d1 Feb 13 01:33:16.571689 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 13 01:33:16.598454 kernel: hub 1-0:1.0: 16 ports detected Feb 13 01:33:16.598529 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 01:33:16.625683 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 01:33:16.625766 kernel: hub 2-0:1.0: USB hub found Feb 13 01:33:16.664668 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 01:33:16.664740 kernel: hub 2-0:1.0: 10 ports detected Feb 13 01:33:16.715725 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 01:33:16.715744 kernel: usb: port power management may be unreliable Feb 13 01:33:16.716615 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 01:33:16.886666 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 01:33:16.886866 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 01:33:16.897657 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 01:33:16.924663 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Feb 13 01:33:16.924764 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 01:33:16.952109 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 01:33:16.952177 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 01:33:17.017662 kernel: hub 1-14:1.0: USB hub found Feb 13 01:33:17.017761 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 01:33:17.050487 kernel: hub 1-14:1.0: 4 ports detected Feb 13 01:33:17.050593 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 01:33:17.123644 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 01:33:17.138668 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 01:33:17.186653 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 01:33:17.186670 kernel: ata2.00: Features: NCQ-prio Feb 13 01:33:17.219829 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 01:33:17.219846 kernel: ata1.00: Features: NCQ-prio Feb 13 01:33:17.236658 kernel: ata2.00: configured for UDMA/133 Feb 13 01:33:17.253651 kernel: ata1.00: configured for UDMA/133 Feb 13 01:33:17.253666 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 01:33:17.253729 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 01:33:17.292659 kernel: port_module: 9 callbacks suppressed Feb 13 01:33:17.292674 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 13 01:33:17.292737 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 01:33:17.326658 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 01:33:17.365617 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 01:33:17.384620 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 13 01:33:17.421264 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 01:33:17.421280 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 01:33:17.436895 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 01:33:17.436975 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 01:33:17.438675 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 13 01:33:17.473741 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 13 01:33:17.473816 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 13 01:33:17.489418 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 13 01:33:17.520947 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 13 01:33:17.521020 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 01:33:17.536150 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 01:33:17.551162 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 01:33:17.551238 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 01:33:17.571619 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 01:33:17.571634 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 01:33:17.571642 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 01:33:17.571648 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 13 01:33:17.579617 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 01:33:17.605648 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 01:33:17.716699 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 13 01:33:17.716714 kernel: GPT:9289727 != 937703087 Feb 13 01:33:17.716724 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 13 01:33:17.732636 kernel: GPT:9289727 != 937703087 Feb 13 01:33:17.745906 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 13 01:33:17.760699 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 01:33:17.789653 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 01:33:17.789668 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 13 01:33:17.821618 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Feb 13 01:33:17.832818 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 01:33:17.931775 kernel: usbcore: registered new interface driver usbhid Feb 13 01:33:17.931797 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (548) Feb 13 01:33:17.931810 kernel: usbhid: USB HID core driver Feb 13 01:33:17.931820 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 01:33:17.931834 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Feb 13 01:33:17.889733 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 01:33:17.921426 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 01:33:18.020019 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 01:33:18.020239 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 01:33:18.020257 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 01:33:17.944475 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 13 01:33:18.069661 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 01:33:17.991667 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 01:33:18.108763 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 01:33:18.108773 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 01:33:18.055738 systemd[1]: Starting disk-uuid.service... Feb 13 01:33:18.126717 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 01:33:18.126729 disk-uuid[689]: Primary Header is updated. Feb 13 01:33:18.126729 disk-uuid[689]: Secondary Entries is updated. Feb 13 01:33:18.126729 disk-uuid[689]: Secondary Header is updated. Feb 13 01:33:18.177668 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 01:33:18.177679 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 01:33:19.151015 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 01:33:19.169333 disk-uuid[690]: The operation has completed successfully. Feb 13 01:33:19.177802 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 01:33:19.209085 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 01:33:19.302628 kernel: audit: type=1130 audit(1707787999.215:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.302643 kernel: audit: type=1131 audit(1707787999.215:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.209131 systemd[1]: Finished disk-uuid.service. Feb 13 01:33:19.331706 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 01:33:19.216305 systemd[1]: Starting verity-setup.service... Feb 13 01:33:19.395088 systemd[1]: Found device dev-mapper-usr.device. Feb 13 01:33:19.406984 systemd[1]: Mounting sysusr-usr.mount... Feb 13 01:33:19.419239 systemd[1]: Finished verity-setup.service. Feb 13 01:33:19.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.487619 kernel: audit: type=1130 audit(1707787999.433:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.545641 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 01:33:19.545985 systemd[1]: Mounted sysusr-usr.mount. Feb 13 01:33:19.552906 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 13 01:33:19.553291 systemd[1]: Starting ignition-setup.service... Feb 13 01:33:19.642239 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 01:33:19.642253 kernel: BTRFS info (device sda6): using free space tree Feb 13 01:33:19.642261 kernel: BTRFS info (device sda6): has skinny extents Feb 13 01:33:19.642267 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 01:33:19.585054 systemd[1]: Starting parse-ip-for-networkd.service... Feb 13 01:33:19.651007 systemd[1]: Finished ignition-setup.service. Feb 13 01:33:19.716665 kernel: audit: type=1130 audit(1707787999.667:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.667971 systemd[1]: Finished parse-ip-for-networkd.service. Feb 13 01:33:19.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.725278 systemd[1]: Starting ignition-fetch-offline.service... Feb 13 01:33:19.805586 kernel: audit: type=1130 audit(1707787999.724:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.805608 kernel: audit: type=1334 audit(1707787999.782:24): prog-id=9 op=LOAD Feb 13 01:33:19.782000 audit: BPF prog-id=9 op=LOAD Feb 13 01:33:19.784558 systemd[1]: Starting systemd-networkd.service... Feb 13 01:33:19.820535 systemd-networkd[874]: lo: Link UP Feb 13 01:33:19.820537 systemd-networkd[874]: lo: Gained carrier Feb 13 01:33:19.885672 kernel: audit: type=1130 audit(1707787999.834:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.885038 ignition[866]: Ignition 2.14.0 Feb 13 01:33:19.820839 systemd-networkd[874]: Enumeration completed Feb 13 01:33:19.885042 ignition[866]: Stage: fetch-offline Feb 13 01:33:19.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.820885 systemd[1]: Started systemd-networkd.service. Feb 13 01:33:20.052440 kernel: audit: type=1130 audit(1707787999.918:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:20.052456 kernel: audit: type=1130 audit(1707787999.977:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:20.052464 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 01:33:19.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.885069 ignition[866]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 01:33:20.086716 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 13 01:33:19.821500 systemd-networkd[874]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 01:33:19.885083 ignition[866]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 01:33:19.835716 systemd[1]: Reached target network.target. Feb 13 01:33:20.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.891430 ignition[866]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 01:33:20.136731 iscsid[905]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 01:33:20.136731 iscsid[905]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 01:33:20.136731 iscsid[905]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 01:33:20.136731 iscsid[905]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 01:33:20.136731 iscsid[905]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 01:33:20.136731 iscsid[905]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 01:33:20.136731 iscsid[905]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 01:33:20.303796 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 01:33:20.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:20.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:19.894146 systemd[1]: Starting iscsiuio.service... Feb 13 01:33:19.891493 ignition[866]: parsed url from cmdline: "" Feb 13 01:33:19.899841 systemd[1]: Started iscsiuio.service. Feb 13 01:33:19.891495 ignition[866]: no config URL provided Feb 13 01:33:19.911134 unknown[866]: fetched base config from "system" Feb 13 01:33:19.891498 ignition[866]: reading system config file "/usr/lib/ignition/user.ign" Feb 13 01:33:19.911138 unknown[866]: fetched user config from "system" Feb 13 01:33:19.891528 ignition[866]: parsing config with SHA512: c8769bc70e98c4468e326edf910aacd941a54f439905cc2548aa3649cc20093fd0a350b1ead4a0f4cfd7ad1efc9a781d98d0fc81b7411fa90d9334bb0edc9f2d Feb 13 01:33:19.918967 systemd[1]: Finished ignition-fetch-offline.service. Feb 13 01:33:19.911750 ignition[866]: fetch-offline: fetch-offline passed Feb 13 01:33:19.978816 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 13 01:33:19.911759 ignition[866]: POST message to Packet Timeline Feb 13 01:33:19.979330 systemd[1]: Starting ignition-kargs.service... Feb 13 01:33:19.911765 ignition[866]: POST Status error: resource requires networking Feb 13 01:33:20.053300 systemd-networkd[874]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 01:33:19.911804 ignition[866]: Ignition finished successfully Feb 13 01:33:20.066109 systemd[1]: Starting iscsid.service... Feb 13 01:33:20.056532 ignition[894]: Ignition 2.14.0 Feb 13 01:33:20.093778 systemd[1]: Started iscsid.service. Feb 13 01:33:20.056535 ignition[894]: Stage: kargs Feb 13 01:33:20.114139 systemd[1]: Starting dracut-initqueue.service... Feb 13 01:33:20.056590 ignition[894]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 01:33:20.127799 systemd[1]: Finished dracut-initqueue.service. Feb 13 01:33:20.056600 ignition[894]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 01:33:20.144883 systemd[1]: Reached target remote-fs-pre.target. Feb 13 01:33:20.057912 ignition[894]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 01:33:20.162775 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 01:33:20.059623 ignition[894]: kargs: kargs passed Feb 13 01:33:20.162818 systemd[1]: Reached target remote-fs.target. Feb 13 01:33:20.059626 ignition[894]: POST message to Packet Timeline Feb 13 01:33:20.207381 systemd[1]: Starting dracut-pre-mount.service... Feb 13 01:33:20.059636 ignition[894]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 01:33:20.226855 systemd[1]: Finished dracut-pre-mount.service. Feb 13 01:33:20.061771 ignition[894]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:37673->[::1]:53: read: connection refused Feb 13 01:33:20.268049 systemd-networkd[874]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 01:33:20.262119 ignition[894]: GET https://metadata.packet.net/metadata: attempt #2 Feb 13 01:33:20.296852 systemd-networkd[874]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 01:33:20.262571 ignition[894]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:52631->[::1]:53: read: connection refused Feb 13 01:33:20.325141 systemd-networkd[874]: enp1s0f1np1: Link UP Feb 13 01:33:20.325419 systemd-networkd[874]: enp1s0f1np1: Gained carrier Feb 13 01:33:20.333918 systemd-networkd[874]: enp1s0f0np0: Link UP Feb 13 01:33:20.334263 systemd-networkd[874]: eno2: Link UP Feb 13 01:33:20.334506 systemd-networkd[874]: eno1: Link UP Feb 13 01:33:20.663363 ignition[894]: GET https://metadata.packet.net/metadata: attempt #3 Feb 13 01:33:20.664669 ignition[894]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:56187->[::1]:53: read: connection refused Feb 13 01:33:21.123454 systemd-networkd[874]: enp1s0f0np0: Gained carrier Feb 13 01:33:21.132844 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 13 01:33:21.153809 systemd-networkd[874]: enp1s0f0np0: DHCPv4 address 147.75.90.7/31, gateway 147.75.90.6 acquired from 145.40.83.140 Feb 13 01:33:21.465216 ignition[894]: GET https://metadata.packet.net/metadata: attempt #4 Feb 13 01:33:21.466659 ignition[894]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:39138->[::1]:53: read: connection refused Feb 13 01:33:21.612215 systemd-networkd[874]: enp1s0f1np1: Gained IPv6LL Feb 13 01:33:22.636200 systemd-networkd[874]: enp1s0f0np0: Gained IPv6LL Feb 13 01:33:23.067948 ignition[894]: GET https://metadata.packet.net/metadata: attempt #5 Feb 13 01:33:23.069456 ignition[894]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33877->[::1]:53: read: connection refused Feb 13 01:33:26.272645 ignition[894]: GET https://metadata.packet.net/metadata: attempt #6 Feb 13 01:33:26.314360 ignition[894]: GET result: OK Feb 13 01:33:26.520030 ignition[894]: Ignition finished successfully Feb 13 01:33:26.524588 systemd[1]: Finished ignition-kargs.service. Feb 13 01:33:26.613740 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 01:33:26.613756 kernel: audit: type=1130 audit(1707788006.535:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:26.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:26.546221 ignition[922]: Ignition 2.14.0 Feb 13 01:33:26.538894 systemd[1]: Starting ignition-disks.service... Feb 13 01:33:26.546225 ignition[922]: Stage: disks Feb 13 01:33:26.546281 ignition[922]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 01:33:26.546291 ignition[922]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 01:33:26.548501 ignition[922]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 01:33:26.549236 ignition[922]: disks: disks passed Feb 13 01:33:26.549239 ignition[922]: POST message to Packet Timeline Feb 13 01:33:26.549250 ignition[922]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 01:33:26.572986 ignition[922]: GET result: OK Feb 13 01:33:26.770955 ignition[922]: Ignition finished successfully Feb 13 01:33:26.774030 systemd[1]: Finished ignition-disks.service. Feb 13 01:33:26.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:26.850641 kernel: audit: type=1130 audit(1707788006.784:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:26.786134 systemd[1]: Reached target initrd-root-device.target. Feb 13 01:33:26.859790 systemd[1]: Reached target local-fs-pre.target. Feb 13 01:33:26.859829 systemd[1]: Reached target local-fs.target. Feb 13 01:33:26.882789 systemd[1]: Reached target sysinit.target. Feb 13 01:33:26.896818 systemd[1]: Reached target basic.target. Feb 13 01:33:26.911725 systemd[1]: Starting systemd-fsck-root.service... Feb 13 01:33:26.934313 systemd-fsck[937]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 13 01:33:26.945072 systemd[1]: Finished systemd-fsck-root.service. Feb 13 01:33:27.036636 kernel: audit: type=1130 audit(1707788006.952:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.036650 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 01:33:26.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:26.959329 systemd[1]: Mounting sysroot.mount... Feb 13 01:33:27.044249 systemd[1]: Mounted sysroot.mount. Feb 13 01:33:27.057870 systemd[1]: Reached target initrd-root-fs.target. Feb 13 01:33:27.065552 systemd[1]: Mounting sysroot-usr.mount... Feb 13 01:33:27.091465 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 13 01:33:27.100249 systemd[1]: Starting flatcar-static-network.service... Feb 13 01:33:27.115810 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 13 01:33:27.115846 systemd[1]: Reached target ignition-diskful.target. Feb 13 01:33:27.134960 systemd[1]: Mounted sysroot-usr.mount. Feb 13 01:33:27.161348 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 01:33:27.232695 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (948) Feb 13 01:33:27.232714 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 01:33:27.172966 systemd[1]: Starting initrd-setup-root.service... Feb 13 01:33:27.308576 kernel: BTRFS info (device sda6): using free space tree Feb 13 01:33:27.308591 kernel: BTRFS info (device sda6): has skinny extents Feb 13 01:33:27.308599 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 01:33:27.308606 initrd-setup-root[955]: cut: /sysroot/etc/passwd: No such file or directory Feb 13 01:33:27.370856 kernel: audit: type=1130 audit(1707788007.317:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.370901 coreos-metadata[945]: Feb 13 01:33:27.249 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 01:33:27.370901 coreos-metadata[945]: Feb 13 01:33:27.289 INFO Fetch successful Feb 13 01:33:27.556936 kernel: audit: type=1130 audit(1707788007.380:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.556947 kernel: audit: type=1131 audit(1707788007.380:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.556955 kernel: audit: type=1130 audit(1707788007.499:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.557013 coreos-metadata[944]: Feb 13 01:33:27.250 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 01:33:27.557013 coreos-metadata[944]: Feb 13 01:33:27.323 INFO Fetch successful Feb 13 01:33:27.557013 coreos-metadata[944]: Feb 13 01:33:27.346 INFO wrote hostname ci-3510.3.2-a-ab9b2e6956 to /sysroot/etc/hostname Feb 13 01:33:27.242486 systemd[1]: Finished initrd-setup-root.service. Feb 13 01:33:27.620718 initrd-setup-root[963]: cut: /sysroot/etc/group: No such file or directory Feb 13 01:33:27.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.318975 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 13 01:33:27.697883 kernel: audit: type=1130 audit(1707788007.627:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.697898 initrd-setup-root[971]: cut: /sysroot/etc/shadow: No such file or directory Feb 13 01:33:27.319016 systemd[1]: Finished flatcar-static-network.service. Feb 13 01:33:27.716831 initrd-setup-root[979]: cut: /sysroot/etc/gshadow: No such file or directory Feb 13 01:33:27.380983 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 13 01:33:27.735901 ignition[1021]: INFO : Ignition 2.14.0 Feb 13 01:33:27.735901 ignition[1021]: INFO : Stage: mount Feb 13 01:33:27.735901 ignition[1021]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 01:33:27.735901 ignition[1021]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 01:33:27.735901 ignition[1021]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 01:33:27.735901 ignition[1021]: INFO : mount: mount passed Feb 13 01:33:27.735901 ignition[1021]: INFO : POST message to Packet Timeline Feb 13 01:33:27.735901 ignition[1021]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 01:33:27.735901 ignition[1021]: INFO : GET result: OK Feb 13 01:33:27.499912 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 01:33:27.566283 systemd[1]: Starting ignition-mount.service... Feb 13 01:33:27.594250 systemd[1]: Starting sysroot-boot.service... Feb 13 01:33:27.613435 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 13 01:33:27.613475 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 13 01:33:27.614122 systemd[1]: Finished sysroot-boot.service. Feb 13 01:33:27.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.934227 ignition[1021]: INFO : Ignition finished successfully Feb 13 01:33:27.949694 kernel: audit: type=1130 audit(1707788007.876:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:27.863607 systemd[1]: Finished ignition-mount.service. Feb 13 01:33:27.879748 systemd[1]: Starting ignition-files.service... Feb 13 01:33:27.943418 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 01:33:28.044661 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1034) Feb 13 01:33:28.044674 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 01:33:28.044682 kernel: BTRFS info (device sda6): using free space tree Feb 13 01:33:28.044691 kernel: BTRFS info (device sda6): has skinny extents Feb 13 01:33:28.044701 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 01:33:28.077152 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 01:33:28.094945 ignition[1053]: INFO : Ignition 2.14.0 Feb 13 01:33:28.094945 ignition[1053]: INFO : Stage: files Feb 13 01:33:28.094945 ignition[1053]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 01:33:28.094945 ignition[1053]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 01:33:28.094945 ignition[1053]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 01:33:28.098296 unknown[1053]: wrote ssh authorized keys file for user: core Feb 13 01:33:28.160843 ignition[1053]: DEBUG : files: compiled without relabeling support, skipping Feb 13 01:33:28.160843 ignition[1053]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 13 01:33:28.160843 ignition[1053]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 13 01:33:28.160843 ignition[1053]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 13 01:33:28.160843 ignition[1053]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 13 01:33:28.160843 ignition[1053]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 13 01:33:28.160843 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 13 01:33:28.160843 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 13 01:33:28.265815 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 13 01:33:28.280209 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 13 01:33:28.280209 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Feb 13 01:33:28.312867 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Feb 13 01:33:28.312867 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 13 01:33:28.312867 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 13 01:33:28.799007 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 13 01:33:28.897575 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 13 01:33:28.922826 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 13 01:33:28.922826 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 13 01:33:28.922826 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 13 01:33:29.325995 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 13 01:33:29.374282 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 13 01:33:29.398920 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 13 01:33:29.398920 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Feb 13 01:33:29.398920 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 13 01:33:29.451357 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 13 01:33:29.712007 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 13 01:33:29.712007 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 13 01:33:29.751783 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 13 01:33:29.751783 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 13 01:33:29.783696 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 13 01:33:30.330604 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 13 01:33:30.330604 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 13 01:33:30.376778 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 13 01:33:30.376778 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 13 01:33:30.408715 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Feb 13 01:33:30.630489 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 13 01:33:30.630489 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 13 01:33:30.630489 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 13 01:33:30.696854 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1075) Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(10): oem config not found in "/usr/share/oem", looking on oem partition Feb 13 01:33:30.696918 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(10): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3188481962" Feb 13 01:33:30.696918 ignition[1053]: CRITICAL : files: createFilesystemsFiles: createFiles: op(10): op(11): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3188481962": device or resource busy Feb 13 01:33:31.004826 kernel: audit: type=1130 audit(1707788010.916:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:30.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:30.895917 systemd[1]: Finished ignition-files.service. Feb 13 01:33:31.018772 ignition[1053]: ERROR : files: createFilesystemsFiles: createFiles: op(10): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3188481962", trying btrfs: device or resource busy Feb 13 01:33:31.018772 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(10): op(12): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3188481962" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(10): op(12): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3188481962" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(10): op(13): [started] unmounting "/mnt/oem3188481962" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(10): op(13): [finished] unmounting "/mnt/oem3188481962" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(15): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(15): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(16): [started] processing unit "containerd.service" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(16): op(17): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(16): op(17): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(16): [finished] processing unit "containerd.service" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(18): [started] processing unit "prepare-cni-plugins.service" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(18): op(19): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 13 01:33:31.018772 ignition[1053]: INFO : files: op(18): op(19): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 13 01:33:31.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:30.923899 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(18): [finished] processing unit "prepare-cni-plugins.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1a): [started] processing unit "prepare-critools.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1a): op(1b): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1a): op(1b): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1a): [finished] processing unit "prepare-critools.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1c): [started] processing unit "prepare-helm.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1c): op(1d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1c): op(1d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1c): [finished] processing unit "prepare-helm.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1e): [started] setting preset to enabled for "packet-phone-home.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1e): [finished] setting preset to enabled for "packet-phone-home.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(1f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(20): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Feb 13 01:33:31.405940 ignition[1053]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 13 01:33:32.082162 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 13 01:33:32.082179 kernel: audit: type=1131 audit(1707788011.612:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.082187 kernel: audit: type=1131 audit(1707788011.715:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.082194 kernel: audit: type=1131 audit(1707788011.781:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.082201 kernel: audit: type=1131 audit(1707788011.945:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.082208 kernel: audit: type=1131 audit(1707788012.022:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.082307 initrd-setup-root-after-ignition[1089]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 01:33:32.152378 kernel: audit: type=1131 audit(1707788012.090:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:30.984878 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 13 01:33:32.176821 ignition[1053]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 13 01:33:32.176821 ignition[1053]: INFO : files: files passed Feb 13 01:33:32.176821 ignition[1053]: INFO : POST message to Packet Timeline Feb 13 01:33:32.176821 ignition[1053]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 01:33:32.176821 ignition[1053]: INFO : GET result: OK Feb 13 01:33:32.176821 ignition[1053]: INFO : Ignition finished successfully Feb 13 01:33:32.421027 kernel: audit: type=1131 audit(1707788012.196:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.421047 kernel: audit: type=1131 audit(1707788012.290:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.421055 kernel: audit: type=1131 audit(1707788012.361:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:30.985263 systemd[1]: Starting ignition-quench.service... Feb 13 01:33:32.485567 kernel: audit: type=1131 audit(1707788012.427:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.485598 iscsid[905]: iscsid shutting down. Feb 13 01:33:32.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.011981 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 01:33:32.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.019001 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 13 01:33:31.019048 systemd[1]: Finished ignition-quench.service. Feb 13 01:33:32.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.047009 systemd[1]: Reached target ignition-complete.target. Feb 13 01:33:32.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.070570 systemd[1]: Starting initrd-parse-etc.service... Feb 13 01:33:32.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.582172 ignition[1104]: INFO : Ignition 2.14.0 Feb 13 01:33:32.582172 ignition[1104]: INFO : Stage: umount Feb 13 01:33:32.582172 ignition[1104]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 01:33:32.582172 ignition[1104]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 01:33:32.582172 ignition[1104]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 01:33:32.582172 ignition[1104]: INFO : umount: umount passed Feb 13 01:33:32.582172 ignition[1104]: INFO : POST message to Packet Timeline Feb 13 01:33:32.582172 ignition[1104]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 01:33:32.582172 ignition[1104]: INFO : GET result: OK Feb 13 01:33:32.582172 ignition[1104]: INFO : Ignition finished successfully Feb 13 01:33:32.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.122523 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 01:33:32.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.754000 audit: BPF prog-id=6 op=UNLOAD Feb 13 01:33:31.122641 systemd[1]: Finished initrd-parse-etc.service. Feb 13 01:33:31.135068 systemd[1]: Reached target initrd-fs.target. Feb 13 01:33:31.159953 systemd[1]: Reached target initrd.target. Feb 13 01:33:32.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.179076 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 01:33:32.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.181193 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 01:33:32.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.214318 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 01:33:31.232220 systemd[1]: Starting initrd-cleanup.service... Feb 13 01:33:32.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.264730 systemd[1]: Stopped target nss-lookup.target. Feb 13 01:33:31.275298 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 01:33:31.303336 systemd[1]: Stopped target timers.target. Feb 13 01:33:32.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.321282 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 01:33:32.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.321669 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 01:33:32.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.343600 systemd[1]: Stopped target initrd.target. Feb 13 01:33:31.369289 systemd[1]: Stopped target basic.target. Feb 13 01:33:32.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.396321 systemd[1]: Stopped target ignition-complete.target. Feb 13 01:33:32.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:32.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.415328 systemd[1]: Stopped target ignition-diskful.target. Feb 13 01:33:31.436311 systemd[1]: Stopped target initrd-root-device.target. Feb 13 01:33:31.456309 systemd[1]: Stopped target remote-fs.target. Feb 13 01:33:31.481297 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 01:33:31.506334 systemd[1]: Stopped target sysinit.target. Feb 13 01:33:31.525306 systemd[1]: Stopped target local-fs.target. Feb 13 01:33:31.544309 systemd[1]: Stopped target local-fs-pre.target. Feb 13 01:33:31.569307 systemd[1]: Stopped target swap.target. Feb 13 01:33:31.594196 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 01:33:31.594563 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 01:33:31.614507 systemd[1]: Stopped target cryptsetup.target. Feb 13 01:33:31.702985 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 01:33:31.703063 systemd[1]: Stopped dracut-initqueue.service. Feb 13 01:33:31.716101 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 13 01:33:31.716172 systemd[1]: Stopped ignition-fetch-offline.service. Feb 13 01:33:31.782063 systemd[1]: Stopped target paths.target. Feb 13 01:33:31.848975 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 01:33:31.850853 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 01:33:33.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:31.862995 systemd[1]: Stopped target slices.target. Feb 13 01:33:31.902980 systemd[1]: Stopped target sockets.target. Feb 13 01:33:31.924048 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 01:33:33.166000 audit: BPF prog-id=8 op=UNLOAD Feb 13 01:33:33.166000 audit: BPF prog-id=7 op=UNLOAD Feb 13 01:33:31.924227 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 01:33:33.177000 audit: BPF prog-id=5 op=UNLOAD Feb 13 01:33:33.178000 audit: BPF prog-id=4 op=UNLOAD Feb 13 01:33:33.178000 audit: BPF prog-id=3 op=UNLOAD Feb 13 01:33:31.947383 systemd[1]: ignition-files.service: Deactivated successfully. Feb 13 01:33:31.947756 systemd[1]: Stopped ignition-files.service. Feb 13 01:33:32.023945 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 13 01:33:32.024009 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 13 01:33:32.092415 systemd[1]: Stopping ignition-mount.service... Feb 13 01:33:32.160030 systemd[1]: Stopping iscsid.service... Feb 13 01:33:32.176934 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 01:33:32.177006 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 01:33:32.198603 systemd[1]: Stopping sysroot-boot.service... Feb 13 01:33:32.265836 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 01:33:32.265992 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 01:33:32.292021 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 01:33:32.292096 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 01:33:32.363324 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 13 01:33:32.363681 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 01:33:32.363755 systemd[1]: Stopped iscsid.service. Feb 13 01:33:32.447243 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 13 01:33:32.447281 systemd[1]: Stopped ignition-mount.service. Feb 13 01:33:32.494053 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 13 01:33:32.494091 systemd[1]: Stopped sysroot-boot.service. Feb 13 01:33:32.508059 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 01:33:32.508103 systemd[1]: Closed iscsid.socket. Feb 13 01:33:32.523887 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 13 01:33:32.523910 systemd[1]: Stopped ignition-disks.service. Feb 13 01:33:32.540810 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 13 01:33:32.540838 systemd[1]: Stopped ignition-kargs.service. Feb 13 01:33:32.555843 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 13 01:33:32.555881 systemd[1]: Stopped ignition-setup.service. Feb 13 01:33:32.572906 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 01:33:32.572984 systemd[1]: Stopped initrd-setup-root.service. Feb 13 01:33:32.591180 systemd[1]: Stopping iscsiuio.service... Feb 13 01:33:32.606791 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 01:33:32.607034 systemd[1]: Stopped iscsiuio.service. Feb 13 01:33:32.620425 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 01:33:32.620652 systemd[1]: Finished initrd-cleanup.service. Feb 13 01:33:32.633171 systemd[1]: Stopped target network.target. Feb 13 01:33:32.663939 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 01:33:32.664050 systemd[1]: Closed iscsiuio.socket. Feb 13 01:33:32.682371 systemd[1]: Stopping systemd-networkd.service... Feb 13 01:33:32.691206 systemd[1]: Stopping systemd-resolved.service... Feb 13 01:33:32.692757 systemd-networkd[874]: enp1s0f0np0: DHCPv6 lease lost Feb 13 01:33:32.702762 systemd-networkd[874]: enp1s0f1np1: DHCPv6 lease lost Feb 13 01:33:33.230722 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Feb 13 01:33:33.228000 audit: BPF prog-id=9 op=UNLOAD Feb 13 01:33:32.706460 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 13 01:33:32.706721 systemd[1]: Stopped systemd-resolved.service. Feb 13 01:33:32.724122 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 13 01:33:32.724165 systemd[1]: Stopped systemd-networkd.service. Feb 13 01:33:32.747927 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 13 01:33:32.747949 systemd[1]: Closed systemd-networkd.socket. Feb 13 01:33:32.765319 systemd[1]: Stopping network-cleanup.service... Feb 13 01:33:32.777817 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 13 01:33:32.778003 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 13 01:33:32.793022 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 01:33:32.793143 systemd[1]: Stopped systemd-sysctl.service. Feb 13 01:33:32.808252 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 01:33:32.808393 systemd[1]: Stopped systemd-modules-load.service. Feb 13 01:33:32.827252 systemd[1]: Stopping systemd-udevd.service... Feb 13 01:33:32.845684 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 01:33:32.847193 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 01:33:32.847517 systemd[1]: Stopped systemd-udevd.service. Feb 13 01:33:32.859764 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 01:33:32.859885 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 01:33:32.871974 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 01:33:32.872085 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 01:33:32.886858 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 01:33:32.887041 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 01:33:32.903012 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 01:33:32.903138 systemd[1]: Stopped dracut-cmdline.service. Feb 13 01:33:32.918010 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 01:33:32.918147 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 01:33:32.935580 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 01:33:32.948686 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 01:33:32.948713 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 01:33:32.963834 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 01:33:32.964056 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 01:33:33.112823 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 13 01:33:33.113037 systemd[1]: Stopped network-cleanup.service. Feb 13 01:33:33.128134 systemd[1]: Reached target initrd-switch-root.target. Feb 13 01:33:33.145588 systemd[1]: Starting initrd-switch-root.service... Feb 13 01:33:33.164050 systemd[1]: Switching root. Feb 13 01:33:33.231474 systemd-journald[268]: Journal stopped Feb 13 01:33:36.903313 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 01:33:36.903327 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 01:33:36.903336 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 01:33:36.903341 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 01:33:36.903347 kernel: SELinux: policy capability open_perms=1 Feb 13 01:33:36.903353 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 01:33:36.903359 kernel: SELinux: policy capability always_check_network=0 Feb 13 01:33:36.903364 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 01:33:36.903370 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 01:33:36.903376 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 01:33:36.903381 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 01:33:36.903388 systemd[1]: Successfully loaded SELinux policy in 325.285ms. Feb 13 01:33:36.903395 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.065ms. Feb 13 01:33:36.903402 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 01:33:36.903410 systemd[1]: Detected architecture x86-64. Feb 13 01:33:36.903416 systemd[1]: Detected first boot. Feb 13 01:33:36.903422 systemd[1]: Hostname set to . Feb 13 01:33:36.903428 systemd[1]: Initializing machine ID from random generator. Feb 13 01:33:36.903434 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 01:33:36.903441 systemd[1]: Populated /etc with preset unit settings. Feb 13 01:33:36.903447 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 01:33:36.903454 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 01:33:36.903461 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 01:33:36.903468 systemd[1]: Queued start job for default target multi-user.target. Feb 13 01:33:36.903475 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 01:33:36.903481 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 01:33:36.903488 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 01:33:36.903495 systemd[1]: Created slice system-getty.slice. Feb 13 01:33:36.903502 systemd[1]: Created slice system-modprobe.slice. Feb 13 01:33:36.903508 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 01:33:36.903515 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 01:33:36.903522 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 01:33:36.903528 systemd[1]: Created slice user.slice. Feb 13 01:33:36.903534 systemd[1]: Started systemd-ask-password-console.path. Feb 13 01:33:36.903540 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 01:33:36.903546 systemd[1]: Set up automount boot.automount. Feb 13 01:33:36.903553 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 01:33:36.903560 systemd[1]: Reached target integritysetup.target. Feb 13 01:33:36.903566 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 01:33:36.903572 systemd[1]: Reached target remote-fs.target. Feb 13 01:33:36.903580 systemd[1]: Reached target slices.target. Feb 13 01:33:36.903587 systemd[1]: Reached target swap.target. Feb 13 01:33:36.903593 systemd[1]: Reached target torcx.target. Feb 13 01:33:36.903600 systemd[1]: Reached target veritysetup.target. Feb 13 01:33:36.903607 systemd[1]: Listening on systemd-coredump.socket. Feb 13 01:33:36.903616 systemd[1]: Listening on systemd-initctl.socket. Feb 13 01:33:36.903623 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 01:33:36.903630 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 01:33:36.903636 systemd[1]: Listening on systemd-journald.socket. Feb 13 01:33:36.903643 systemd[1]: Listening on systemd-networkd.socket. Feb 13 01:33:36.903649 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 01:33:36.903656 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 01:33:36.903664 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 01:33:36.903671 systemd[1]: Mounting dev-hugepages.mount... Feb 13 01:33:36.903678 systemd[1]: Mounting dev-mqueue.mount... Feb 13 01:33:36.903684 systemd[1]: Mounting media.mount... Feb 13 01:33:36.903691 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 01:33:36.903698 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 01:33:36.903705 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 01:33:36.903712 systemd[1]: Mounting tmp.mount... Feb 13 01:33:36.903719 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 01:33:36.903726 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 01:33:36.903732 systemd[1]: Starting kmod-static-nodes.service... Feb 13 01:33:36.903739 systemd[1]: Starting modprobe@configfs.service... Feb 13 01:33:36.903746 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 01:33:36.903753 systemd[1]: Starting modprobe@drm.service... Feb 13 01:33:36.903760 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 01:33:36.903767 systemd[1]: Starting modprobe@fuse.service... Feb 13 01:33:36.903774 kernel: fuse: init (API version 7.34) Feb 13 01:33:36.903780 systemd[1]: Starting modprobe@loop.service... Feb 13 01:33:36.903786 kernel: loop: module loaded Feb 13 01:33:36.903793 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 01:33:36.903800 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Feb 13 01:33:36.903807 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Feb 13 01:33:36.903813 systemd[1]: Starting systemd-journald.service... Feb 13 01:33:36.903821 systemd[1]: Starting systemd-modules-load.service... Feb 13 01:33:36.903828 kernel: kauditd_printk_skb: 43 callbacks suppressed Feb 13 01:33:36.903834 kernel: audit: type=1305 audit(1707788016.899:94): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 01:33:36.903842 systemd-journald[1297]: Journal started Feb 13 01:33:36.903868 systemd-journald[1297]: Runtime Journal (/run/log/journal/0e1114bcb1134f7fb6e4de62ddf836e3) is 8.0M, max 640.1M, 632.1M free. Feb 13 01:33:36.286000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 01:33:36.286000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Feb 13 01:33:36.899000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 01:33:36.899000 audit[1297]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffc2a1a8770 a2=4000 a3=7ffc2a1a880c items=0 ppid=1 pid=1297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:33:36.899000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 01:33:36.957658 kernel: audit: type=1300 audit(1707788016.899:94): arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffc2a1a8770 a2=4000 a3=7ffc2a1a880c items=0 ppid=1 pid=1297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:33:36.957677 kernel: audit: type=1327 audit(1707788016.899:94): proctitle="/usr/lib/systemd/systemd-journald" Feb 13 01:33:37.062803 systemd[1]: Starting systemd-network-generator.service... Feb 13 01:33:37.087657 systemd[1]: Starting systemd-remount-fs.service... Feb 13 01:33:37.111645 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 01:33:37.152664 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 01:33:37.169647 systemd[1]: Started systemd-journald.service. Feb 13 01:33:37.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.178331 systemd[1]: Mounted dev-hugepages.mount. Feb 13 01:33:37.223673 kernel: audit: type=1130 audit(1707788017.177:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.230869 systemd[1]: Mounted dev-mqueue.mount. Feb 13 01:33:37.237866 systemd[1]: Mounted media.mount. Feb 13 01:33:37.244864 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 01:33:37.253893 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 01:33:37.262835 systemd[1]: Mounted tmp.mount. Feb 13 01:33:37.269983 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 01:33:37.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.278965 systemd[1]: Finished kmod-static-nodes.service. Feb 13 01:33:37.325660 kernel: audit: type=1130 audit(1707788017.277:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.333932 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 01:33:37.334008 systemd[1]: Finished modprobe@configfs.service. Feb 13 01:33:37.383802 kernel: audit: type=1130 audit(1707788017.333:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.391947 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 01:33:37.392018 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 01:33:37.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.442615 kernel: audit: type=1130 audit(1707788017.391:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.442644 kernel: audit: type=1131 audit(1707788017.391:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.502948 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 01:33:37.503018 systemd[1]: Finished modprobe@drm.service. Feb 13 01:33:37.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.556685 kernel: audit: type=1130 audit(1707788017.502:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.556717 kernel: audit: type=1131 audit(1707788017.502:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.618931 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 01:33:37.619003 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 01:33:37.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.627933 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 01:33:37.628003 systemd[1]: Finished modprobe@fuse.service. Feb 13 01:33:37.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.637023 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 01:33:37.637143 systemd[1]: Finished modprobe@loop.service. Feb 13 01:33:37.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.645996 systemd[1]: Finished systemd-modules-load.service. Feb 13 01:33:37.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.654966 systemd[1]: Finished systemd-network-generator.service. Feb 13 01:33:37.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.663986 systemd[1]: Finished systemd-remount-fs.service. Feb 13 01:33:37.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.671994 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 01:33:37.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.680027 systemd[1]: Reached target network-pre.target. Feb 13 01:33:37.688941 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 01:33:37.698210 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 01:33:37.704766 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 01:33:37.707009 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 01:33:37.715206 systemd[1]: Starting systemd-journal-flush.service... Feb 13 01:33:37.722814 systemd-journald[1297]: Time spent on flushing to /var/log/journal/0e1114bcb1134f7fb6e4de62ddf836e3 is 14.534ms for 1557 entries. Feb 13 01:33:37.722814 systemd-journald[1297]: System Journal (/var/log/journal/0e1114bcb1134f7fb6e4de62ddf836e3) is 8.0M, max 195.6M, 187.6M free. Feb 13 01:33:37.770041 systemd-journald[1297]: Received client request to flush runtime journal. Feb 13 01:33:37.730728 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 01:33:37.731276 systemd[1]: Starting systemd-random-seed.service... Feb 13 01:33:37.755758 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 01:33:37.756360 systemd[1]: Starting systemd-sysctl.service... Feb 13 01:33:37.763318 systemd[1]: Starting systemd-sysusers.service... Feb 13 01:33:37.770302 systemd[1]: Starting systemd-udev-settle.service... Feb 13 01:33:37.779008 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 01:33:37.786812 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 01:33:37.795875 systemd[1]: Finished systemd-journal-flush.service. Feb 13 01:33:37.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.803873 systemd[1]: Finished systemd-random-seed.service. Feb 13 01:33:37.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.811839 systemd[1]: Finished systemd-sysctl.service. Feb 13 01:33:37.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.819832 systemd[1]: Finished systemd-sysusers.service. Feb 13 01:33:37.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:37.828755 systemd[1]: Reached target first-boot-complete.target. Feb 13 01:33:37.837409 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 01:33:37.846007 udevadm[1323]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 13 01:33:37.854910 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 01:33:37.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:38.019459 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 01:33:38.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:38.029570 systemd[1]: Starting systemd-udevd.service... Feb 13 01:33:38.041398 systemd-udevd[1331]: Using default interface naming scheme 'v252'. Feb 13 01:33:38.058687 systemd[1]: Started systemd-udevd.service. Feb 13 01:33:38.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:38.070359 systemd[1]: Found device dev-ttyS1.device. Feb 13 01:33:38.097672 systemd[1]: Starting systemd-networkd.service... Feb 13 01:33:38.120193 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 01:33:38.120266 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 01:33:38.120294 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1396) Feb 13 01:33:38.129345 systemd[1]: Starting systemd-userdbd.service... Feb 13 01:33:38.148626 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 01:33:38.172619 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 01:33:38.197679 kernel: ACPI: button: Power Button [PWRF] Feb 13 01:33:38.242445 kernel: IPMI message handler: version 39.2 Feb 13 01:33:38.106000 audit[1352]: AVC avc: denied { confidentiality } for pid=1352 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 01:33:38.252832 systemd[1]: dev-disk-by\x2dlabel-OEM.device was skipped because of an unmet condition check (ConditionPathExists=!/usr/.noupdate). Feb 13 01:33:38.274922 systemd[1]: Started systemd-userdbd.service. Feb 13 01:33:38.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:38.304622 kernel: ipmi device interface Feb 13 01:33:38.106000 audit[1352]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f532934f010 a1=4d8bc a2=7f532afe8bc5 a3=5 items=42 ppid=1331 pid=1352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:33:38.106000 audit: CWD cwd="/" Feb 13 01:33:38.106000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=1 name=(null) inode=15461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=2 name=(null) inode=15461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=3 name=(null) inode=15462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=4 name=(null) inode=15461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=5 name=(null) inode=15463 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=6 name=(null) inode=15461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=7 name=(null) inode=15464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=8 name=(null) inode=15464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=9 name=(null) inode=15465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=10 name=(null) inode=15464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=11 name=(null) inode=15466 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=12 name=(null) inode=15464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=13 name=(null) inode=15467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=14 name=(null) inode=15464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=15 name=(null) inode=15468 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=16 name=(null) inode=15464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=17 name=(null) inode=15469 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=18 name=(null) inode=15461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=19 name=(null) inode=15470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=20 name=(null) inode=15470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=21 name=(null) inode=15471 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=22 name=(null) inode=15470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=23 name=(null) inode=15472 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=24 name=(null) inode=15470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=25 name=(null) inode=15473 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=26 name=(null) inode=15470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=27 name=(null) inode=15474 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=28 name=(null) inode=15470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=29 name=(null) inode=15475 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=30 name=(null) inode=15461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=31 name=(null) inode=15476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=32 name=(null) inode=15476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=33 name=(null) inode=15477 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=34 name=(null) inode=15476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=35 name=(null) inode=15478 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=36 name=(null) inode=15476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=37 name=(null) inode=15479 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=38 name=(null) inode=15476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=39 name=(null) inode=15480 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=40 name=(null) inode=15476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PATH item=41 name=(null) inode=15481 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:33:38.106000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 01:33:38.362631 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 01:33:38.362895 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 01:33:38.363618 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 01:33:38.363740 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 01:33:38.363855 kernel: ipmi_si: IPMI System Interface driver Feb 13 01:33:38.363874 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 01:33:38.363969 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 01:33:38.363988 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 01:33:38.364005 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 01:33:38.364108 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 01:33:38.364203 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 13 01:33:38.569623 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 01:33:38.616643 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 01:33:38.616680 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 01:33:38.664618 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 01:33:38.736279 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 13 01:33:38.736395 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 01:33:38.736483 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 13 01:33:38.758618 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 13 01:33:38.818338 systemd-networkd[1407]: bond0: netdev ready Feb 13 01:33:38.820726 systemd-networkd[1407]: lo: Link UP Feb 13 01:33:38.820729 systemd-networkd[1407]: lo: Gained carrier Feb 13 01:33:38.821342 systemd-networkd[1407]: Enumeration completed Feb 13 01:33:38.821460 systemd[1]: Started systemd-networkd.service. Feb 13 01:33:38.821734 systemd-networkd[1407]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 01:33:38.828126 systemd-networkd[1407]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:42:74:e9.network. Feb 13 01:33:38.834072 kernel: intel_rapl_common: Found RAPL domain package Feb 13 01:33:38.834132 kernel: intel_rapl_common: Found RAPL domain core Feb 13 01:33:38.834166 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 01:33:38.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:38.855808 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 01:33:38.908657 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 01:33:38.914912 systemd[1]: Finished systemd-udev-settle.service. Feb 13 01:33:38.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:38.924597 systemd[1]: Starting lvm2-activation-early.service... Feb 13 01:33:38.940370 lvm[1437]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 01:33:38.978059 systemd[1]: Finished lvm2-activation-early.service. Feb 13 01:33:38.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:38.987765 systemd[1]: Reached target cryptsetup.target. Feb 13 01:33:38.997383 systemd[1]: Starting lvm2-activation.service... Feb 13 01:33:38.999556 lvm[1439]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 01:33:39.035081 systemd[1]: Finished lvm2-activation.service. Feb 13 01:33:39.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:39.043751 systemd[1]: Reached target local-fs-pre.target. Feb 13 01:33:39.052665 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 01:33:39.052679 systemd[1]: Reached target local-fs.target. Feb 13 01:33:39.061653 systemd[1]: Reached target machines.target. Feb 13 01:33:39.071365 systemd[1]: Starting ldconfig.service... Feb 13 01:33:39.079020 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 01:33:39.079041 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 01:33:39.079585 systemd[1]: Starting systemd-boot-update.service... Feb 13 01:33:39.088074 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 01:33:39.099212 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 01:33:39.099302 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 01:33:39.099333 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 01:33:39.099973 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 01:33:39.100226 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1443 (bootctl) Feb 13 01:33:39.100975 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 01:33:39.115972 systemd-tmpfiles[1447]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 01:33:39.119956 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 01:33:39.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:39.127049 systemd-tmpfiles[1447]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 01:33:39.138161 systemd-tmpfiles[1447]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 01:33:39.286729 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 01:33:39.313650 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 13 01:33:39.314938 systemd-networkd[1407]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:42:74:e8.network. Feb 13 01:33:39.363647 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 01:33:39.485639 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 01:33:39.486141 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 01:33:39.508620 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 13 01:33:39.530675 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 01:33:39.551752 systemd-networkd[1407]: bond0: Link UP Feb 13 01:33:39.551977 systemd-networkd[1407]: enp1s0f1np1: Link UP Feb 13 01:33:39.552086 systemd-networkd[1407]: enp1s0f1np1: Gained carrier Feb 13 01:33:39.553062 systemd-networkd[1407]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:42:74:e8.network. Feb 13 01:33:39.592671 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.614661 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.636658 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.657618 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.677618 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.696651 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.715616 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.734618 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.752618 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.770653 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.788619 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.806616 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.823352 systemd-fsck[1453]: fsck.fat 4.2 (2021-01-31) Feb 13 01:33:39.823352 systemd-fsck[1453]: /dev/sda1: 789 files, 115339/258078 clusters Feb 13 01:33:39.823616 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.824132 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 01:33:39.824545 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 01:33:39.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:39.839918 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 01:33:39.841616 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:39.858420 systemd[1]: Mounting boot.mount... Feb 13 01:33:39.858635 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.872904 systemd[1]: Mounted boot.mount. Feb 13 01:33:39.876617 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.893618 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.893742 systemd-networkd[1407]: enp1s0f0np0: Link UP Feb 13 01:33:39.893905 systemd-networkd[1407]: bond0: Gained carrier Feb 13 01:33:39.893989 systemd-networkd[1407]: enp1s0f0np0: Gained carrier Feb 13 01:33:39.902668 systemd[1]: Finished systemd-boot-update.service. Feb 13 01:33:39.909631 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 13 01:33:39.909699 kernel: bond0: (slave enp1s0f1np1): link status definitely down, disabling slave Feb 13 01:33:39.909737 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 01:33:39.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:39.950922 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 01:33:39.959090 systemd-networkd[1407]: enp1s0f1np1: Link DOWN Feb 13 01:33:39.959093 systemd-networkd[1407]: enp1s0f1np1: Lost carrier Feb 13 01:33:39.959617 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 13 01:33:39.959637 kernel: bond0: active interface up! Feb 13 01:33:39.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:39.979665 systemd[1]: Starting audit-rules.service... Feb 13 01:33:39.987301 systemd[1]: Starting clean-ca-certificates.service... Feb 13 01:33:39.996364 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 01:33:39.996000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 01:33:39.996000 audit[1480]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdebd92f30 a2=420 a3=0 items=0 ppid=1463 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:33:39.996000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 01:33:39.998025 augenrules[1480]: No rules Feb 13 01:33:40.006506 systemd[1]: Starting systemd-resolved.service... Feb 13 01:33:40.015458 systemd[1]: Starting systemd-timesyncd.service... Feb 13 01:33:40.022247 systemd[1]: Starting systemd-update-utmp.service... Feb 13 01:33:40.029973 systemd[1]: Finished audit-rules.service. Feb 13 01:33:40.036815 systemd[1]: Finished clean-ca-certificates.service. Feb 13 01:33:40.037862 ldconfig[1442]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 01:33:40.045802 systemd[1]: Finished ldconfig.service. Feb 13 01:33:40.053792 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 01:33:40.066491 systemd[1]: Starting systemd-update-done.service... Feb 13 01:33:40.074654 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 01:33:40.074983 systemd[1]: Finished systemd-update-utmp.service. Feb 13 01:33:40.082870 systemd[1]: Finished systemd-update-done.service. Feb 13 01:33:40.104736 systemd-resolved[1487]: Positive Trust Anchors: Feb 13 01:33:40.104748 systemd-resolved[1487]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 01:33:40.104782 systemd-resolved[1487]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 01:33:40.110250 systemd-resolved[1487]: Using system hostname 'ci-3510.3.2-a-ab9b2e6956'. Feb 13 01:33:40.110617 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 01:33:40.113408 systemd[1]: Started systemd-timesyncd.service. Feb 13 01:33:40.114574 systemd-networkd[1407]: enp1s0f1np1: Link UP Feb 13 01:33:40.114744 systemd-networkd[1407]: enp1s0f1np1: Gained carrier Feb 13 01:33:40.122819 systemd[1]: Started systemd-resolved.service. Feb 13 01:33:40.131723 systemd[1]: Reached target network.target. Feb 13 01:33:40.139712 systemd[1]: Reached target nss-lookup.target. Feb 13 01:33:40.147705 systemd[1]: Reached target sysinit.target. Feb 13 01:33:40.155748 systemd[1]: Started motdgen.path. Feb 13 01:33:40.162724 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 01:33:40.185893 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 01:33:40.194091 kernel: bond0: (slave enp1s0f1np1): link status up, enabling it in 200 ms Feb 13 01:33:40.194115 kernel: bond0: (slave enp1s0f1np1): invalid new link 3 on slave Feb 13 01:33:40.202703 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 01:33:40.202718 systemd[1]: Reached target paths.target. Feb 13 01:33:40.209689 systemd[1]: Reached target time-set.target. Feb 13 01:33:40.217755 systemd[1]: Started logrotate.timer. Feb 13 01:33:40.224740 systemd[1]: Started mdadm.timer. Feb 13 01:33:40.231678 systemd[1]: Reached target timers.target. Feb 13 01:33:40.238814 systemd[1]: Listening on dbus.socket. Feb 13 01:33:40.246283 systemd[1]: Starting docker.socket... Feb 13 01:33:40.254384 systemd[1]: Listening on sshd.socket. Feb 13 01:33:40.260743 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 01:33:40.260959 systemd[1]: Listening on docker.socket. Feb 13 01:33:40.267712 systemd[1]: Reached target sockets.target. Feb 13 01:33:40.275691 systemd[1]: Reached target basic.target. Feb 13 01:33:40.282740 systemd[1]: System is tainted: cgroupsv1 Feb 13 01:33:40.282771 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 01:33:40.282792 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 01:33:40.283323 systemd[1]: Starting containerd.service... Feb 13 01:33:40.290104 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 01:33:40.299140 systemd[1]: Starting coreos-metadata.service... Feb 13 01:33:40.306224 systemd[1]: Starting dbus.service... Feb 13 01:33:40.312305 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 01:33:40.317375 jq[1507]: false Feb 13 01:33:40.318503 coreos-metadata[1500]: Feb 13 01:33:40.318 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 01:33:40.320408 systemd[1]: Starting extend-filesystems.service... Feb 13 01:33:40.323928 dbus-daemon[1506]: [system] SELinux support is enabled Feb 13 01:33:40.327725 extend-filesystems[1510]: Found sda Feb 13 01:33:40.334778 extend-filesystems[1510]: Found sda1 Feb 13 01:33:40.334778 extend-filesystems[1510]: Found sda2 Feb 13 01:33:40.334778 extend-filesystems[1510]: Found sda3 Feb 13 01:33:40.334778 extend-filesystems[1510]: Found usr Feb 13 01:33:40.334778 extend-filesystems[1510]: Found sda4 Feb 13 01:33:40.334778 extend-filesystems[1510]: Found sda6 Feb 13 01:33:40.334778 extend-filesystems[1510]: Found sda7 Feb 13 01:33:40.334778 extend-filesystems[1510]: Found sda9 Feb 13 01:33:40.334778 extend-filesystems[1510]: Checking size of /dev/sda9 Feb 13 01:33:40.334778 extend-filesystems[1510]: Resized partition /dev/sda9 Feb 13 01:33:40.491707 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 13 01:33:40.491729 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 13 01:33:40.327727 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 01:33:40.491811 coreos-metadata[1503]: Feb 13 01:33:40.328 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 01:33:40.491930 extend-filesystems[1521]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 01:33:40.328500 systemd[1]: Starting motdgen.service... Feb 13 01:33:40.350447 systemd[1]: Starting prepare-cni-plugins.service... Feb 13 01:33:40.372971 systemd[1]: Starting prepare-critools.service... Feb 13 01:33:40.384327 systemd[1]: Starting prepare-helm.service... Feb 13 01:33:40.400255 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 01:33:40.421781 systemd[1]: Starting sshd-keygen.service... Feb 13 01:33:40.441725 systemd[1]: Starting systemd-logind.service... Feb 13 01:33:40.459661 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 01:33:40.460315 systemd[1]: Starting tcsd.service... Feb 13 01:33:40.508299 jq[1546]: true Feb 13 01:33:40.465294 systemd-logind[1543]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 01:33:40.465303 systemd-logind[1543]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 01:33:40.465312 systemd-logind[1543]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 01:33:40.465413 systemd-logind[1543]: New seat seat0. Feb 13 01:33:40.472366 systemd[1]: Starting update-engine.service... Feb 13 01:33:40.480300 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 01:33:40.500120 systemd[1]: Started dbus.service. Feb 13 01:33:40.514157 update_engine[1545]: I0213 01:33:40.513698 1545 main.cc:92] Flatcar Update Engine starting Feb 13 01:33:40.516718 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 01:33:40.516877 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 01:33:40.517120 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 01:33:40.517255 systemd[1]: Finished motdgen.service. Feb 13 01:33:40.517418 update_engine[1545]: I0213 01:33:40.517408 1545 update_check_scheduler.cc:74] Next update check in 9m37s Feb 13 01:33:40.524701 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 01:33:40.524819 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 01:33:40.529509 tar[1550]: ./ Feb 13 01:33:40.529509 tar[1550]: ./macvlan Feb 13 01:33:40.535310 jq[1556]: true Feb 13 01:33:40.536028 tar[1551]: crictl Feb 13 01:33:40.536309 dbus-daemon[1506]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 01:33:40.537438 tar[1552]: linux-amd64/helm Feb 13 01:33:40.541199 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 01:33:40.541357 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 01:33:40.544200 systemd[1]: Started systemd-logind.service. Feb 13 01:33:40.549031 env[1557]: time="2024-02-13T01:33:40.548971279Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 01:33:40.550536 tar[1550]: ./static Feb 13 01:33:40.556724 systemd[1]: Started update-engine.service. Feb 13 01:33:40.561587 env[1557]: time="2024-02-13T01:33:40.561527300Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 01:33:40.562181 env[1557]: time="2024-02-13T01:33:40.562167625Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 01:33:40.562747 bash[1582]: Updated "/home/core/.ssh/authorized_keys" Feb 13 01:33:40.562864 env[1557]: time="2024-02-13T01:33:40.562810093Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 01:33:40.562864 env[1557]: time="2024-02-13T01:33:40.562827867Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 01:33:40.562991 env[1557]: time="2024-02-13T01:33:40.562980645Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 01:33:40.563028 env[1557]: time="2024-02-13T01:33:40.562991317Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 01:33:40.563028 env[1557]: time="2024-02-13T01:33:40.562998985Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 01:33:40.563028 env[1557]: time="2024-02-13T01:33:40.563004770Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 01:33:40.563098 env[1557]: time="2024-02-13T01:33:40.563056301Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 01:33:40.563219 env[1557]: time="2024-02-13T01:33:40.563208039Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 01:33:40.563321 env[1557]: time="2024-02-13T01:33:40.563306837Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 01:33:40.563350 env[1557]: time="2024-02-13T01:33:40.563321099Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 01:33:40.563377 env[1557]: time="2024-02-13T01:33:40.563347813Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 01:33:40.563377 env[1557]: time="2024-02-13T01:33:40.563358173Z" level=info msg="metadata content store policy set" policy=shared Feb 13 01:33:40.564867 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 13 01:33:40.569656 env[1557]: time="2024-02-13T01:33:40.569642015Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 01:33:40.569698 env[1557]: time="2024-02-13T01:33:40.569658748Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 01:33:40.569698 env[1557]: time="2024-02-13T01:33:40.569667105Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 01:33:40.569698 env[1557]: time="2024-02-13T01:33:40.569685720Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 01:33:40.569698 env[1557]: time="2024-02-13T01:33:40.569693754Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 01:33:40.569790 env[1557]: time="2024-02-13T01:33:40.569701343Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 01:33:40.569790 env[1557]: time="2024-02-13T01:33:40.569708159Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 01:33:40.569790 env[1557]: time="2024-02-13T01:33:40.569715910Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 01:33:40.569790 env[1557]: time="2024-02-13T01:33:40.569724458Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 01:33:40.569790 env[1557]: time="2024-02-13T01:33:40.569731936Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 01:33:40.569790 env[1557]: time="2024-02-13T01:33:40.569738942Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 01:33:40.569790 env[1557]: time="2024-02-13T01:33:40.569746980Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 01:33:40.569957 env[1557]: time="2024-02-13T01:33:40.569799859Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 01:33:40.569957 env[1557]: time="2024-02-13T01:33:40.569844174Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 01:33:40.570035 env[1557]: time="2024-02-13T01:33:40.570025552Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 01:33:40.570065 env[1557]: time="2024-02-13T01:33:40.570041036Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570065 env[1557]: time="2024-02-13T01:33:40.570050581Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 01:33:40.570112 env[1557]: time="2024-02-13T01:33:40.570075752Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570112 env[1557]: time="2024-02-13T01:33:40.570084777Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570112 env[1557]: time="2024-02-13T01:33:40.570091552Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570112 env[1557]: time="2024-02-13T01:33:40.570097550Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570112 env[1557]: time="2024-02-13T01:33:40.570103859Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570112 env[1557]: time="2024-02-13T01:33:40.570110333Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570247 env[1557]: time="2024-02-13T01:33:40.570118490Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570247 env[1557]: time="2024-02-13T01:33:40.570124882Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570247 env[1557]: time="2024-02-13T01:33:40.570133446Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 01:33:40.570247 env[1557]: time="2024-02-13T01:33:40.570203403Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570247 env[1557]: time="2024-02-13T01:33:40.570212404Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570247 env[1557]: time="2024-02-13T01:33:40.570219605Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570247 env[1557]: time="2024-02-13T01:33:40.570226039Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 01:33:40.570247 env[1557]: time="2024-02-13T01:33:40.570235040Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 01:33:40.570247 env[1557]: time="2024-02-13T01:33:40.570241277Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 01:33:40.570466 env[1557]: time="2024-02-13T01:33:40.570254008Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 01:33:40.570466 env[1557]: time="2024-02-13T01:33:40.570275504Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 01:33:40.570515 env[1557]: time="2024-02-13T01:33:40.570388988Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 01:33:40.570515 env[1557]: time="2024-02-13T01:33:40.570419641Z" level=info msg="Connect containerd service" Feb 13 01:33:40.570515 env[1557]: time="2024-02-13T01:33:40.570436447Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 01:33:40.572056 env[1557]: time="2024-02-13T01:33:40.570710581Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 01:33:40.572056 env[1557]: time="2024-02-13T01:33:40.570800084Z" level=info msg="Start subscribing containerd event" Feb 13 01:33:40.572056 env[1557]: time="2024-02-13T01:33:40.570832127Z" level=info msg="Start recovering state" Feb 13 01:33:40.572056 env[1557]: time="2024-02-13T01:33:40.570837408Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 01:33:40.572056 env[1557]: time="2024-02-13T01:33:40.570870465Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 01:33:40.572056 env[1557]: time="2024-02-13T01:33:40.570875715Z" level=info msg="Start event monitor" Feb 13 01:33:40.572056 env[1557]: time="2024-02-13T01:33:40.570907076Z" level=info msg="containerd successfully booted in 0.022757s" Feb 13 01:33:40.572056 env[1557]: time="2024-02-13T01:33:40.570912832Z" level=info msg="Start snapshots syncer" Feb 13 01:33:40.572056 env[1557]: time="2024-02-13T01:33:40.570921943Z" level=info msg="Start cni network conf syncer for default" Feb 13 01:33:40.572056 env[1557]: time="2024-02-13T01:33:40.570928823Z" level=info msg="Start streaming server" Feb 13 01:33:40.574521 tar[1550]: ./vlan Feb 13 01:33:40.574834 systemd[1]: Started containerd.service. Feb 13 01:33:40.583270 systemd[1]: Started locksmithd.service. Feb 13 01:33:40.589758 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 01:33:40.589839 systemd[1]: Reached target system-config.target. Feb 13 01:33:40.595720 tar[1550]: ./portmap Feb 13 01:33:40.597725 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 01:33:40.597809 systemd[1]: Reached target user-config.target. Feb 13 01:33:40.615914 tar[1550]: ./host-local Feb 13 01:33:40.633260 tar[1550]: ./vrf Feb 13 01:33:40.646278 locksmithd[1597]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 01:33:40.651464 tar[1550]: ./bridge Feb 13 01:33:40.673198 tar[1550]: ./tuning Feb 13 01:33:40.690519 tar[1550]: ./firewall Feb 13 01:33:40.712976 tar[1550]: ./host-device Feb 13 01:33:40.732538 tar[1550]: ./sbr Feb 13 01:33:40.735881 sshd_keygen[1542]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 01:33:40.747629 systemd[1]: Finished sshd-keygen.service. Feb 13 01:33:40.750433 tar[1550]: ./loopback Feb 13 01:33:40.755740 systemd[1]: Starting issuegen.service... Feb 13 01:33:40.762915 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 01:33:40.763048 systemd[1]: Finished issuegen.service. Feb 13 01:33:40.767417 tar[1550]: ./dhcp Feb 13 01:33:40.770675 systemd[1]: Starting systemd-user-sessions.service... Feb 13 01:33:40.778965 systemd[1]: Finished systemd-user-sessions.service. Feb 13 01:33:40.787625 systemd[1]: Started getty@tty1.service. Feb 13 01:33:40.790801 tar[1552]: linux-amd64/LICENSE Feb 13 01:33:40.790840 tar[1552]: linux-amd64/README.md Feb 13 01:33:40.796501 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 01:33:40.805784 systemd[1]: Reached target getty.target. Feb 13 01:33:40.816534 systemd[1]: Finished prepare-helm.service. Feb 13 01:33:40.816690 tar[1550]: ./ptp Feb 13 01:33:40.825048 systemd[1]: Finished prepare-critools.service. Feb 13 01:33:40.837821 tar[1550]: ./ipvlan Feb 13 01:33:40.851684 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 13 01:33:40.880613 extend-filesystems[1521]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 13 01:33:40.880613 extend-filesystems[1521]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 01:33:40.880613 extend-filesystems[1521]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 13 01:33:40.918731 extend-filesystems[1510]: Resized filesystem in /dev/sda9 Feb 13 01:33:40.918731 extend-filesystems[1510]: Found sdb Feb 13 01:33:40.881151 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 01:33:40.941753 tar[1550]: ./bandwidth Feb 13 01:33:40.881280 systemd[1]: Finished extend-filesystems.service. Feb 13 01:33:40.913433 systemd[1]: Finished prepare-cni-plugins.service. Feb 13 01:33:41.131709 systemd-networkd[1407]: bond0: Gained IPv6LL Feb 13 01:33:42.178837 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 01:33:45.573279 coreos-metadata[1500]: Feb 13 01:33:45.573 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 13 01:33:45.574221 coreos-metadata[1503]: Feb 13 01:33:45.573 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 13 01:33:45.818807 login[1621]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 01:33:45.824934 login[1619]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 01:33:45.826892 systemd-logind[1543]: New session 1 of user core. Feb 13 01:33:45.827325 systemd[1]: Created slice user-500.slice. Feb 13 01:33:45.827874 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 01:33:45.829096 systemd-logind[1543]: New session 2 of user core. Feb 13 01:33:45.833277 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 01:33:45.833934 systemd[1]: Starting user@500.service... Feb 13 01:33:45.835976 (systemd)[1639]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:33:45.925532 systemd[1639]: Queued start job for default target default.target. Feb 13 01:33:45.925637 systemd[1639]: Reached target paths.target. Feb 13 01:33:45.925648 systemd[1639]: Reached target sockets.target. Feb 13 01:33:45.925656 systemd[1639]: Reached target timers.target. Feb 13 01:33:45.925664 systemd[1639]: Reached target basic.target. Feb 13 01:33:45.925684 systemd[1639]: Reached target default.target. Feb 13 01:33:45.925697 systemd[1639]: Startup finished in 86ms. Feb 13 01:33:45.925749 systemd[1]: Started user@500.service. Feb 13 01:33:45.926255 systemd[1]: Started session-1.scope. Feb 13 01:33:45.926542 systemd[1]: Started session-2.scope. Feb 13 01:33:46.573491 coreos-metadata[1503]: Feb 13 01:33:46.573 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 01:33:46.573820 coreos-metadata[1500]: Feb 13 01:33:46.573 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 01:33:46.577668 coreos-metadata[1503]: Feb 13 01:33:46.577 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 13 01:33:46.580897 coreos-metadata[1500]: Feb 13 01:33:46.580 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 13 01:33:47.713829 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 13 01:33:47.713980 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 13 01:33:48.252049 systemd[1]: Created slice system-sshd.slice. Feb 13 01:33:48.252764 systemd[1]: Started sshd@0-147.75.90.7:22-139.178.68.195:51856.service. Feb 13 01:33:48.304597 sshd[1662]: Accepted publickey for core from 139.178.68.195 port 51856 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:33:48.305461 sshd[1662]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:33:48.308390 systemd-logind[1543]: New session 3 of user core. Feb 13 01:33:48.309012 systemd[1]: Started session-3.scope. Feb 13 01:33:48.360976 systemd[1]: Started sshd@1-147.75.90.7:22-139.178.68.195:53666.service. Feb 13 01:33:48.393330 sshd[1667]: Accepted publickey for core from 139.178.68.195 port 53666 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:33:48.393996 sshd[1667]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:33:48.396284 systemd-logind[1543]: New session 4 of user core. Feb 13 01:33:48.396721 systemd[1]: Started session-4.scope. Feb 13 01:33:48.446830 sshd[1667]: pam_unix(sshd:session): session closed for user core Feb 13 01:33:48.448997 systemd[1]: Started sshd@2-147.75.90.7:22-139.178.68.195:53670.service. Feb 13 01:33:48.449476 systemd[1]: sshd@1-147.75.90.7:22-139.178.68.195:53666.service: Deactivated successfully. Feb 13 01:33:48.450317 systemd-logind[1543]: Session 4 logged out. Waiting for processes to exit. Feb 13 01:33:48.450381 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 01:33:48.451298 systemd-logind[1543]: Removed session 4. Feb 13 01:33:48.484666 sshd[1673]: Accepted publickey for core from 139.178.68.195 port 53670 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:33:48.485578 sshd[1673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:33:48.488693 systemd-logind[1543]: New session 5 of user core. Feb 13 01:33:48.489356 systemd[1]: Started session-5.scope. Feb 13 01:33:48.544513 sshd[1673]: pam_unix(sshd:session): session closed for user core Feb 13 01:33:48.545822 systemd[1]: sshd@2-147.75.90.7:22-139.178.68.195:53670.service: Deactivated successfully. Feb 13 01:33:48.546370 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 01:33:48.546398 systemd-logind[1543]: Session 5 logged out. Waiting for processes to exit. Feb 13 01:33:48.546980 systemd-logind[1543]: Removed session 5. Feb 13 01:33:48.577748 coreos-metadata[1503]: Feb 13 01:33:48.577 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 13 01:33:48.580922 coreos-metadata[1500]: Feb 13 01:33:48.580 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 13 01:33:48.598938 coreos-metadata[1503]: Feb 13 01:33:48.598 INFO Fetch successful Feb 13 01:33:48.601450 coreos-metadata[1500]: Feb 13 01:33:48.601 INFO Fetch successful Feb 13 01:33:48.660837 systemd[1]: Finished coreos-metadata.service. Feb 13 01:33:48.661838 systemd[1]: Started packet-phone-home.service. Feb 13 01:33:48.661889 unknown[1500]: wrote ssh authorized keys file for user: core Feb 13 01:33:48.676027 curl[1686]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 01:33:48.677168 curl[1686]: Dload Upload Total Spent Left Speed Feb 13 01:33:48.687185 update-ssh-keys[1688]: Updated "/home/core/.ssh/authorized_keys" Feb 13 01:33:48.688662 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 01:33:48.689582 systemd[1]: Reached target multi-user.target. Feb 13 01:33:48.693319 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 01:33:48.713227 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 01:33:48.713899 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 01:33:48.714425 systemd[1]: Startup finished in 21.456s (kernel) + 15.274s (userspace) = 36.730s. Feb 13 01:33:48.893866 curl[1686]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 01:33:48.896266 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 01:33:58.551113 systemd[1]: Started sshd@3-147.75.90.7:22-139.178.68.195:60162.service. Feb 13 01:33:58.584018 sshd[1695]: Accepted publickey for core from 139.178.68.195 port 60162 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:33:58.584978 sshd[1695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:33:58.588393 systemd-logind[1543]: New session 6 of user core. Feb 13 01:33:58.589090 systemd[1]: Started session-6.scope. Feb 13 01:33:58.646780 sshd[1695]: pam_unix(sshd:session): session closed for user core Feb 13 01:33:58.648265 systemd[1]: Started sshd@4-147.75.90.7:22-139.178.68.195:60176.service. Feb 13 01:33:58.648596 systemd[1]: sshd@3-147.75.90.7:22-139.178.68.195:60162.service: Deactivated successfully. Feb 13 01:33:58.649227 systemd-logind[1543]: Session 6 logged out. Waiting for processes to exit. Feb 13 01:33:58.649229 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 01:33:58.649633 systemd-logind[1543]: Removed session 6. Feb 13 01:33:58.681412 sshd[1701]: Accepted publickey for core from 139.178.68.195 port 60176 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:33:58.682401 sshd[1701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:33:58.685922 systemd-logind[1543]: New session 7 of user core. Feb 13 01:33:58.686765 systemd[1]: Started session-7.scope. Feb 13 01:33:58.742379 sshd[1701]: pam_unix(sshd:session): session closed for user core Feb 13 01:33:58.743834 systemd[1]: Started sshd@5-147.75.90.7:22-139.178.68.195:60186.service. Feb 13 01:33:58.744103 systemd[1]: sshd@4-147.75.90.7:22-139.178.68.195:60176.service: Deactivated successfully. Feb 13 01:33:58.744541 systemd-logind[1543]: Session 7 logged out. Waiting for processes to exit. Feb 13 01:33:58.744555 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 01:33:58.745081 systemd-logind[1543]: Removed session 7. Feb 13 01:33:58.776600 sshd[1708]: Accepted publickey for core from 139.178.68.195 port 60186 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:33:58.777524 sshd[1708]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:33:58.780701 systemd-logind[1543]: New session 8 of user core. Feb 13 01:33:58.781509 systemd[1]: Started session-8.scope. Feb 13 01:33:58.849044 sshd[1708]: pam_unix(sshd:session): session closed for user core Feb 13 01:33:58.854955 systemd[1]: Started sshd@6-147.75.90.7:22-139.178.68.195:60196.service. Feb 13 01:33:58.856441 systemd[1]: sshd@5-147.75.90.7:22-139.178.68.195:60186.service: Deactivated successfully. Feb 13 01:33:58.858816 systemd-logind[1543]: Session 8 logged out. Waiting for processes to exit. Feb 13 01:33:58.859022 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 01:33:58.861462 systemd-logind[1543]: Removed session 8. Feb 13 01:33:58.914225 sshd[1714]: Accepted publickey for core from 139.178.68.195 port 60196 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:33:58.915885 sshd[1714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:33:58.921232 systemd-logind[1543]: New session 9 of user core. Feb 13 01:33:58.922417 systemd[1]: Started session-9.scope. Feb 13 01:33:59.009692 sudo[1720]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 01:33:59.010320 sudo[1720]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 01:33:59.032067 dbus-daemon[1506]: \xd0-\x9a \xc0U: received setenforce notice (enforcing=854768176) Feb 13 01:33:59.037149 sudo[1720]: pam_unix(sudo:session): session closed for user root Feb 13 01:33:59.043388 sshd[1714]: pam_unix(sshd:session): session closed for user core Feb 13 01:33:59.049647 systemd[1]: Started sshd@7-147.75.90.7:22-139.178.68.195:60208.service. Feb 13 01:33:59.051174 systemd[1]: sshd@6-147.75.90.7:22-139.178.68.195:60196.service: Deactivated successfully. Feb 13 01:33:59.053729 systemd-logind[1543]: Session 9 logged out. Waiting for processes to exit. Feb 13 01:33:59.053779 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 01:33:59.056376 systemd-logind[1543]: Removed session 9. Feb 13 01:33:59.122770 sshd[1722]: Accepted publickey for core from 139.178.68.195 port 60208 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:33:59.125815 sshd[1722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:33:59.135813 systemd-logind[1543]: New session 10 of user core. Feb 13 01:33:59.138166 systemd[1]: Started session-10.scope. Feb 13 01:33:59.195455 sudo[1729]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 01:33:59.195753 sudo[1729]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 01:33:59.200038 sudo[1729]: pam_unix(sudo:session): session closed for user root Feb 13 01:33:59.209430 sudo[1728]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 01:33:59.210038 sudo[1728]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 01:33:59.235103 systemd[1]: Stopping audit-rules.service... Feb 13 01:33:59.236000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 01:33:59.238559 auditctl[1732]: No rules Feb 13 01:33:59.239423 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 01:33:59.240029 systemd[1]: Stopped audit-rules.service. Feb 13 01:33:59.243930 kernel: kauditd_printk_skb: 78 callbacks suppressed Feb 13 01:33:59.244113 kernel: audit: type=1305 audit(1707788039.236:133): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 01:33:59.244228 systemd[1]: Starting audit-rules.service... Feb 13 01:33:59.236000 audit[1732]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffffb9dcc00 a2=420 a3=0 items=0 ppid=1 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:33:59.279579 augenrules[1750]: No rules Feb 13 01:33:59.280229 systemd[1]: Finished audit-rules.service. Feb 13 01:33:59.281047 sudo[1728]: pam_unix(sudo:session): session closed for user root Feb 13 01:33:59.282330 sshd[1722]: pam_unix(sshd:session): session closed for user core Feb 13 01:33:59.284391 systemd[1]: Started sshd@8-147.75.90.7:22-139.178.68.195:60224.service. Feb 13 01:33:59.285023 systemd[1]: sshd@7-147.75.90.7:22-139.178.68.195:60208.service: Deactivated successfully. Feb 13 01:33:59.285952 systemd-logind[1543]: Session 10 logged out. Waiting for processes to exit. Feb 13 01:33:59.285958 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 01:33:59.286734 systemd-logind[1543]: Removed session 10. Feb 13 01:33:59.291236 kernel: audit: type=1300 audit(1707788039.236:133): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffffb9dcc00 a2=420 a3=0 items=0 ppid=1 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:33:59.291295 kernel: audit: type=1327 audit(1707788039.236:133): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 01:33:59.236000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 01:33:59.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.323214 kernel: audit: type=1131 audit(1707788039.238:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.323246 kernel: audit: type=1130 audit(1707788039.278:135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.279000 audit[1728]: USER_END pid=1728 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.349917 sshd[1755]: Accepted publickey for core from 139.178.68.195 port 60224 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:33:59.351922 sshd[1755]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:33:59.354187 systemd-logind[1543]: New session 11 of user core. Feb 13 01:33:59.354954 systemd[1]: Started session-11.scope. Feb 13 01:33:59.371740 kernel: audit: type=1106 audit(1707788039.279:136): pid=1728 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.371796 kernel: audit: type=1104 audit(1707788039.279:137): pid=1728 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.279000 audit[1728]: CRED_DISP pid=1728 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.281000 audit[1722]: USER_END pid=1722 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:33:59.401088 sudo[1761]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 13 01:33:59.401198 sudo[1761]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 01:33:59.427660 kernel: audit: type=1106 audit(1707788039.281:138): pid=1722 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:33:59.427714 kernel: audit: type=1104 audit(1707788039.282:139): pid=1722 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:33:59.282000 audit[1722]: CRED_DISP pid=1722 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:33:59.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.90.7:22-139.178.68.195:60224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.479001 kernel: audit: type=1130 audit(1707788039.282:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.90.7:22-139.178.68.195:60224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.90.7:22-139.178.68.195:60208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.348000 audit[1755]: USER_ACCT pid=1755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:33:59.350000 audit[1755]: CRED_ACQ pid=1755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:33:59.350000 audit[1755]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb32bf050 a2=3 a3=0 items=0 ppid=1 pid=1755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:33:59.350000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:33:59.355000 audit[1755]: USER_START pid=1755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:33:59.355000 audit[1760]: CRED_ACQ pid=1760 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:33:59.399000 audit[1761]: USER_ACCT pid=1761 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.399000 audit[1761]: CRED_REFR pid=1761 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:33:59.400000 audit[1761]: USER_START pid=1761 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:34:03.398095 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 01:34:03.402283 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 01:34:03.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:03.402566 systemd[1]: Reached target network-online.target. Feb 13 01:34:03.403419 systemd[1]: Starting docker.service... Feb 13 01:34:03.424905 env[1783]: time="2024-02-13T01:34:03.424842551Z" level=info msg="Starting up" Feb 13 01:34:03.425620 env[1783]: time="2024-02-13T01:34:03.425597475Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 01:34:03.425620 env[1783]: time="2024-02-13T01:34:03.425610508Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 01:34:03.425698 env[1783]: time="2024-02-13T01:34:03.425632435Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 01:34:03.425698 env[1783]: time="2024-02-13T01:34:03.425640050Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 01:34:03.426737 env[1783]: time="2024-02-13T01:34:03.426694642Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 01:34:03.426737 env[1783]: time="2024-02-13T01:34:03.426706471Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 01:34:03.426737 env[1783]: time="2024-02-13T01:34:03.426717221Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 01:34:03.426737 env[1783]: time="2024-02-13T01:34:03.426723780Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 01:34:03.853640 env[1783]: time="2024-02-13T01:34:03.853573186Z" level=warning msg="Your kernel does not support cgroup blkio weight" Feb 13 01:34:03.853640 env[1783]: time="2024-02-13T01:34:03.853587609Z" level=warning msg="Your kernel does not support cgroup blkio weight_device" Feb 13 01:34:03.853792 env[1783]: time="2024-02-13T01:34:03.853707788Z" level=info msg="Loading containers: start." Feb 13 01:34:03.882000 audit[1828]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.882000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd97d63c40 a2=0 a3=7ffd97d63c2c items=0 ppid=1783 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.882000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 13 01:34:03.883000 audit[1830]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.883000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffb8045650 a2=0 a3=7fffb804563c items=0 ppid=1783 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.883000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 13 01:34:03.884000 audit[1832]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.884000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff00085b70 a2=0 a3=7fff00085b5c items=0 ppid=1783 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.884000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 13 01:34:03.885000 audit[1834]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.885000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc0a2b5350 a2=0 a3=7ffc0a2b533c items=0 ppid=1783 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 13 01:34:03.886000 audit[1836]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.886000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc0ff79cd0 a2=0 a3=7ffc0ff79cbc items=0 ppid=1783 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.886000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 13 01:34:03.910000 audit[1841]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.910000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe675ff7a0 a2=0 a3=7ffe675ff78c items=0 ppid=1783 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.910000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 13 01:34:03.914000 audit[1843]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.914000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe79688ed0 a2=0 a3=7ffe79688ebc items=0 ppid=1783 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.914000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 13 01:34:03.916000 audit[1845]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.916000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffeaaac4fa0 a2=0 a3=7ffeaaac4f8c items=0 ppid=1783 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.916000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 13 01:34:03.918000 audit[1847]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.918000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdc7091bc0 a2=0 a3=7ffdc7091bac items=0 ppid=1783 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.918000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 01:34:03.926000 audit[1851]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.926000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff120aed40 a2=0 a3=7fff120aed2c items=0 ppid=1783 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.926000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 13 01:34:03.928000 audit[1852]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:03.928000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcbc192eb0 a2=0 a3=7ffcbc192e9c items=0 ppid=1783 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:03.928000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 01:34:03.949654 kernel: Initializing XFRM netlink socket Feb 13 01:34:04.020189 env[1783]: time="2024-02-13T01:34:04.020119736Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 01:34:04.020980 systemd-timesyncd[1489]: Network configuration changed, trying to establish connection. Feb 13 01:34:04.031000 audit[1860]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.031000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeceafa2a0 a2=0 a3=7ffeceafa28c items=0 ppid=1783 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.031000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 13 01:34:04.043000 audit[1863]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.043000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffff392de70 a2=0 a3=7ffff392de5c items=0 ppid=1783 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.043000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 13 01:34:04.045000 audit[1866]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.045000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffe44c5e00 a2=0 a3=7fffe44c5dec items=0 ppid=1783 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.045000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 13 01:34:04.046000 audit[1868]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.046000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd1f12de20 a2=0 a3=7ffd1f12de0c items=0 ppid=1783 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.046000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 13 01:34:04.048000 audit[1870]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.048000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc7d74fae0 a2=0 a3=7ffc7d74facc items=0 ppid=1783 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.048000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 13 01:34:04.049000 audit[1872]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.049000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffcf73c2da0 a2=0 a3=7ffcf73c2d8c items=0 ppid=1783 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.049000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 13 01:34:04.050000 audit[1874]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.050000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffeb8f30810 a2=0 a3=7ffeb8f307fc items=0 ppid=1783 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.050000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 13 01:34:04.057000 audit[1877]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.057000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe9089d1e0 a2=0 a3=7ffe9089d1cc items=0 ppid=1783 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.057000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 13 01:34:04.058000 audit[1879]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.058000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd594c0060 a2=0 a3=7ffd594c004c items=0 ppid=1783 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.058000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 13 01:34:04.060000 audit[1881]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.060000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc8dd7f2f0 a2=0 a3=7ffc8dd7f2dc items=0 ppid=1783 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 13 01:34:04.061000 audit[1883]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.061000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff76da61f0 a2=0 a3=7fff76da61dc items=0 ppid=1783 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.061000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 13 01:34:04.063630 systemd-networkd[1407]: docker0: Link UP Feb 13 01:34:04.066000 audit[1887]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.066000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff064c0560 a2=0 a3=7fff064c054c items=0 ppid=1783 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.066000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 13 01:34:04.067000 audit[1888]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:04.067000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd08899160 a2=0 a3=7ffd0889914c items=0 ppid=1783 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:04.067000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 01:34:04.069700 env[1783]: time="2024-02-13T01:34:04.069653766Z" level=info msg="Loading containers: done." Feb 13 01:34:04.079922 env[1783]: time="2024-02-13T01:34:04.079862197Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 01:34:04.080066 env[1783]: time="2024-02-13T01:34:04.080032777Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 01:34:04.080156 env[1783]: time="2024-02-13T01:34:04.080132503Z" level=info msg="Daemon has completed initialization" Feb 13 01:34:04.096185 systemd[1]: Started docker.service. Feb 13 01:34:04.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:04.104883 env[1783]: time="2024-02-13T01:34:04.104680875Z" level=info msg="API listen on /run/docker.sock" Feb 13 01:34:04.148251 systemd[1]: Reloading. Feb 13 01:34:04.212716 /usr/lib/systemd/system-generators/torcx-generator[1938]: time="2024-02-13T01:34:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 01:34:04.212736 /usr/lib/systemd/system-generators/torcx-generator[1938]: time="2024-02-13T01:34:04Z" level=info msg="torcx already run" Feb 13 01:34:04.286967 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 01:34:04.286979 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 01:34:04.302004 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 01:34:04.316298 systemd-timesyncd[1489]: Contacted time server [2604:a880:400:d0::83:2002]:123 (2.flatcar.pool.ntp.org). Feb 13 01:34:04.316330 systemd-timesyncd[1489]: Initial clock synchronization to Tue 2024-02-13 01:34:04.569669 UTC. Feb 13 01:34:04.354183 systemd[1]: Started kubelet.service. Feb 13 01:34:04.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:04.359812 kernel: kauditd_printk_skb: 85 callbacks suppressed Feb 13 01:34:04.359900 kernel: audit: type=1130 audit(1707788044.352:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:04.377069 kubelet[2003]: E0213 01:34:04.377000 2003 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 13 01:34:04.378224 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 13 01:34:04.378322 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 13 01:34:04.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 01:34:04.468635 kernel: audit: type=1131 audit(1707788044.376:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 01:34:05.064053 env[1557]: time="2024-02-13T01:34:05.063985023Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 13 01:34:05.736325 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount414897195.mount: Deactivated successfully. Feb 13 01:34:07.443299 env[1557]: time="2024-02-13T01:34:07.443236520Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:07.443887 env[1557]: time="2024-02-13T01:34:07.443840192Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:07.444971 env[1557]: time="2024-02-13T01:34:07.444931547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:07.446017 env[1557]: time="2024-02-13T01:34:07.445972987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:07.446515 env[1557]: time="2024-02-13T01:34:07.446472314Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 13 01:34:07.454461 env[1557]: time="2024-02-13T01:34:07.454444756Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 13 01:34:09.622341 env[1557]: time="2024-02-13T01:34:09.622285156Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:09.622963 env[1557]: time="2024-02-13T01:34:09.622908582Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:09.623991 env[1557]: time="2024-02-13T01:34:09.623949958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:09.624978 env[1557]: time="2024-02-13T01:34:09.624931340Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:09.625819 env[1557]: time="2024-02-13T01:34:09.625776568Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 13 01:34:09.632066 env[1557]: time="2024-02-13T01:34:09.632035768Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 13 01:34:10.820032 env[1557]: time="2024-02-13T01:34:10.819982590Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:10.820646 env[1557]: time="2024-02-13T01:34:10.820577909Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:10.821766 env[1557]: time="2024-02-13T01:34:10.821723923Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:10.822846 env[1557]: time="2024-02-13T01:34:10.822834211Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:10.823309 env[1557]: time="2024-02-13T01:34:10.823294130Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 13 01:34:10.829762 env[1557]: time="2024-02-13T01:34:10.829723945Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 13 01:34:11.717599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1262687879.mount: Deactivated successfully. Feb 13 01:34:12.016072 env[1557]: time="2024-02-13T01:34:12.016000945Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:12.016727 env[1557]: time="2024-02-13T01:34:12.016688139Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:12.017914 env[1557]: time="2024-02-13T01:34:12.017867975Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:12.018615 env[1557]: time="2024-02-13T01:34:12.018571966Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:12.018994 env[1557]: time="2024-02-13T01:34:12.018948816Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 13 01:34:12.027668 env[1557]: time="2024-02-13T01:34:12.027645288Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 13 01:34:12.556939 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1390199945.mount: Deactivated successfully. Feb 13 01:34:12.558183 env[1557]: time="2024-02-13T01:34:12.558165434Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:12.558852 env[1557]: time="2024-02-13T01:34:12.558839413Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:12.559457 env[1557]: time="2024-02-13T01:34:12.559443975Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:12.560476 env[1557]: time="2024-02-13T01:34:12.560464633Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:12.560763 env[1557]: time="2024-02-13T01:34:12.560719762Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 13 01:34:12.566388 env[1557]: time="2024-02-13T01:34:12.566287084Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 13 01:34:13.212090 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1767284333.mount: Deactivated successfully. Feb 13 01:34:14.422300 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 13 01:34:14.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:14.422435 systemd[1]: Stopped kubelet.service. Feb 13 01:34:14.423455 systemd[1]: Started kubelet.service. Feb 13 01:34:14.448477 kubelet[2102]: E0213 01:34:14.448403 2102 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 13 01:34:14.451444 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 13 01:34:14.451523 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 13 01:34:14.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:14.538113 kernel: audit: type=1130 audit(1707788054.421:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:14.538177 kernel: audit: type=1131 audit(1707788054.421:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:14.538226 kernel: audit: type=1130 audit(1707788054.422:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:14.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:14.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 01:34:14.658915 kernel: audit: type=1131 audit(1707788054.451:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 01:34:16.107237 env[1557]: time="2024-02-13T01:34:16.107180679Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:16.107789 env[1557]: time="2024-02-13T01:34:16.107777379Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:16.108529 env[1557]: time="2024-02-13T01:34:16.108517149Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:16.109448 env[1557]: time="2024-02-13T01:34:16.109403502Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:16.109872 env[1557]: time="2024-02-13T01:34:16.109829394Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 13 01:34:16.115471 env[1557]: time="2024-02-13T01:34:16.115456722Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 13 01:34:16.617790 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3559553543.mount: Deactivated successfully. Feb 13 01:34:17.039656 env[1557]: time="2024-02-13T01:34:17.039603913Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:17.040336 env[1557]: time="2024-02-13T01:34:17.040293005Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:17.041052 env[1557]: time="2024-02-13T01:34:17.041011432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:17.041818 env[1557]: time="2024-02-13T01:34:17.041769623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:17.042155 env[1557]: time="2024-02-13T01:34:17.042120281Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 13 01:34:18.953045 systemd[1]: Stopped kubelet.service. Feb 13 01:34:18.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:18.962659 systemd[1]: Reloading. Feb 13 01:34:18.990819 /usr/lib/systemd/system-generators/torcx-generator[2257]: time="2024-02-13T01:34:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 01:34:18.990844 /usr/lib/systemd/system-generators/torcx-generator[2257]: time="2024-02-13T01:34:18Z" level=info msg="torcx already run" Feb 13 01:34:18.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:19.017646 kernel: audit: type=1130 audit(1707788058.951:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:19.017704 kernel: audit: type=1131 audit(1707788058.951:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:19.105685 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 01:34:19.105709 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 01:34:19.116602 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 01:34:19.171239 systemd[1]: Started kubelet.service. Feb 13 01:34:19.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:19.193036 kubelet[2323]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 13 01:34:19.193036 kubelet[2323]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 01:34:19.193485 kubelet[2323]: I0213 01:34:19.193050 2323 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 13 01:34:19.193776 kubelet[2323]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 13 01:34:19.193776 kubelet[2323]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 01:34:19.236649 kernel: audit: type=1130 audit(1707788059.169:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:19.556810 kubelet[2323]: I0213 01:34:19.556775 2323 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 13 01:34:19.556810 kubelet[2323]: I0213 01:34:19.556802 2323 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 13 01:34:19.556952 kubelet[2323]: I0213 01:34:19.556925 2323 server.go:836] "Client rotation is on, will bootstrap in background" Feb 13 01:34:19.558332 kubelet[2323]: I0213 01:34:19.558319 2323 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 01:34:19.558746 kubelet[2323]: E0213 01:34:19.558700 2323 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.75.90.7:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:19.577246 kubelet[2323]: I0213 01:34:19.577237 2323 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 13 01:34:19.577444 kubelet[2323]: I0213 01:34:19.577437 2323 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 13 01:34:19.577491 kubelet[2323]: I0213 01:34:19.577485 2323 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 13 01:34:19.577563 kubelet[2323]: I0213 01:34:19.577500 2323 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 13 01:34:19.577563 kubelet[2323]: I0213 01:34:19.577510 2323 container_manager_linux.go:308] "Creating device plugin manager" Feb 13 01:34:19.577623 kubelet[2323]: I0213 01:34:19.577568 2323 state_mem.go:36] "Initialized new in-memory state store" Feb 13 01:34:19.579340 kubelet[2323]: I0213 01:34:19.579332 2323 kubelet.go:398] "Attempting to sync node with API server" Feb 13 01:34:19.579385 kubelet[2323]: I0213 01:34:19.579347 2323 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 13 01:34:19.579385 kubelet[2323]: I0213 01:34:19.579367 2323 kubelet.go:297] "Adding apiserver pod source" Feb 13 01:34:19.579385 kubelet[2323]: I0213 01:34:19.579380 2323 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 13 01:34:19.579591 kubelet[2323]: W0213 01:34:19.579572 2323 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://147.75.90.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-ab9b2e6956&limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:19.579620 kubelet[2323]: W0213 01:34:19.579590 2323 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://147.75.90.7:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:19.579620 kubelet[2323]: E0213 01:34:19.579601 2323 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.90.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-ab9b2e6956&limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:19.579620 kubelet[2323]: E0213 01:34:19.579611 2323 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.90.7:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:19.579678 kubelet[2323]: I0213 01:34:19.579642 2323 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 13 01:34:19.579815 kubelet[2323]: W0213 01:34:19.579808 2323 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 13 01:34:19.580015 kubelet[2323]: I0213 01:34:19.580009 2323 server.go:1186] "Started kubelet" Feb 13 01:34:19.580119 kubelet[2323]: I0213 01:34:19.580081 2323 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 13 01:34:19.580235 kubelet[2323]: E0213 01:34:19.580227 2323 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 13 01:34:19.580269 kubelet[2323]: E0213 01:34:19.580238 2323 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 13 01:34:19.580293 kubelet[2323]: E0213 01:34:19.580248 2323 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b3483122eb64d8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 579999448, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 579999448, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://147.75.90.7:6443/api/v1/namespaces/default/events": dial tcp 147.75.90.7:6443: connect: connection refused'(may retry after sleeping) Feb 13 01:34:19.579000 audit[2323]: AVC avc: denied { mac_admin } for pid=2323 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:34:19.580804 kubelet[2323]: I0213 01:34:19.580766 2323 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 13 01:34:19.580804 kubelet[2323]: I0213 01:34:19.580787 2323 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 13 01:34:19.580845 kubelet[2323]: I0213 01:34:19.580817 2323 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 13 01:34:19.580891 kubelet[2323]: I0213 01:34:19.580878 2323 server.go:451] "Adding debug handlers to kubelet server" Feb 13 01:34:19.580934 kubelet[2323]: I0213 01:34:19.580907 2323 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 13 01:34:19.581183 kubelet[2323]: I0213 01:34:19.581064 2323 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 13 01:34:19.581183 kubelet[2323]: E0213 01:34:19.581065 2323 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-ab9b2e6956\" not found" Feb 13 01:34:19.581260 kubelet[2323]: E0213 01:34:19.581217 2323 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://147.75.90.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-ab9b2e6956?timeout=10s": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:19.581304 kubelet[2323]: W0213 01:34:19.581278 2323 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://147.75.90.7:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:19.581345 kubelet[2323]: E0213 01:34:19.581314 2323 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.90.7:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:19.643637 kubelet[2323]: I0213 01:34:19.643593 2323 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 13 01:34:19.643637 kubelet[2323]: I0213 01:34:19.643603 2323 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 13 01:34:19.643637 kubelet[2323]: I0213 01:34:19.643614 2323 state_mem.go:36] "Initialized new in-memory state store" Feb 13 01:34:19.644501 kubelet[2323]: I0213 01:34:19.644467 2323 policy_none.go:49] "None policy: Start" Feb 13 01:34:19.644660 kubelet[2323]: I0213 01:34:19.644654 2323 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 13 01:34:19.644692 kubelet[2323]: I0213 01:34:19.644664 2323 state_mem.go:35] "Initializing new in-memory state store" Feb 13 01:34:19.579000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 01:34:19.680019 kernel: audit: type=1400 audit(1707788059.579:185): avc: denied { mac_admin } for pid=2323 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:34:19.680049 kernel: audit: type=1401 audit(1707788059.579:185): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 01:34:19.680066 kernel: audit: type=1300 audit(1707788059.579:185): arch=c000003e syscall=188 success=no exit=-22 a0=c0010080c0 a1=c000ef0048 a2=c001008090 a3=25 items=0 ppid=1 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:19.579000 audit[2323]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010080c0 a1=c000ef0048 a2=c001008090 a3=25 items=0 ppid=1 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:19.682285 kubelet[2323]: I0213 01:34:19.682265 2323 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:19.682495 kubelet[2323]: E0213 01:34:19.682462 2323 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.90.7:6443/api/v1/nodes\": dial tcp 147.75.90.7:6443: connect: connection refused" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:19.775913 kernel: audit: type=1327 audit(1707788059.579:185): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 01:34:19.579000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 01:34:19.782363 kubelet[2323]: E0213 01:34:19.782322 2323 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://147.75.90.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-ab9b2e6956?timeout=10s": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:19.869018 kernel: audit: type=1400 audit(1707788059.579:186): avc: denied { mac_admin } for pid=2323 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:34:19.579000 audit[2323]: AVC avc: denied { mac_admin } for pid=2323 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:34:19.870259 kubelet[2323]: I0213 01:34:19.870247 2323 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 13 01:34:19.870315 kubelet[2323]: I0213 01:34:19.870281 2323 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 13 01:34:19.870585 kubelet[2323]: I0213 01:34:19.870574 2323 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 13 01:34:19.870758 kubelet[2323]: E0213 01:34:19.870746 2323 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-ab9b2e6956\" not found" Feb 13 01:34:19.884498 kubelet[2323]: I0213 01:34:19.884481 2323 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:19.884789 kubelet[2323]: E0213 01:34:19.884753 2323 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.90.7:6443/api/v1/nodes\": dial tcp 147.75.90.7:6443: connect: connection refused" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:19.933389 kernel: audit: type=1401 audit(1707788059.579:186): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 01:34:19.579000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 01:34:19.966251 kernel: audit: type=1300 audit(1707788059.579:186): arch=c000003e syscall=188 success=no exit=-22 a0=c0006d2240 a1=c000ef0060 a2=c001008150 a3=25 items=0 ppid=1 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:19.579000 audit[2323]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006d2240 a1=c000ef0060 a2=c001008150 a3=25 items=0 ppid=1 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.061832 kernel: audit: type=1327 audit(1707788059.579:186): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 01:34:19.579000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 01:34:20.154241 kernel: audit: type=1325 audit(1707788059.580:187): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:19.580000 audit[2347]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.182787 kubelet[2323]: E0213 01:34:20.182746 2323 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://147.75.90.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-ab9b2e6956?timeout=10s": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:20.212172 kernel: audit: type=1300 audit(1707788059.580:187): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff3ec1c080 a2=0 a3=7fff3ec1c06c items=0 ppid=2323 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:19.580000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff3ec1c080 a2=0 a3=7fff3ec1c06c items=0 ppid=2323 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.286685 kubelet[2323]: I0213 01:34:20.286627 2323 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:20.286836 kubelet[2323]: E0213 01:34:20.286803 2323 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.90.7:6443/api/v1/nodes\": dial tcp 147.75.90.7:6443: connect: connection refused" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:19.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 13 01:34:19.581000 audit[2348]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:19.581000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc37da7e60 a2=0 a3=7ffc37da7e4c items=0 ppid=2323 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:19.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 13 01:34:19.582000 audit[2350]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:19.582000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe19f8ac80 a2=0 a3=7ffe19f8ac6c items=0 ppid=2323 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:19.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 01:34:19.583000 audit[2352]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:19.583000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff22141220 a2=0 a3=7fff2214120c items=0 ppid=2323 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:19.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 01:34:19.869000 audit[2323]: AVC avc: denied { mac_admin } for pid=2323 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:34:19.869000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 01:34:19.869000 audit[2323]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0019924b0 a1=c000ef1bd8 a2=c001992480 a3=25 items=0 ppid=1 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:19.869000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 01:34:19.933000 audit[2357]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:19.933000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe0adf1a80 a2=0 a3=7ffe0adf1a6c items=0 ppid=2323 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:19.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 13 01:34:19.934000 audit[2358]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:19.934000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe71c4ba00 a2=0 a3=7ffe71c4b9ec items=0 ppid=2323 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:19.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 13 01:34:20.308000 audit[2361]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.308000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe2d029c50 a2=0 a3=7ffe2d029c3c items=0 ppid=2323 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.308000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 13 01:34:20.310000 audit[2364]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.310000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff1e741dd0 a2=0 a3=7fff1e741dbc items=0 ppid=2323 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 13 01:34:20.310000 audit[2365]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.310000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd75854020 a2=0 a3=7ffd7585400c items=0 ppid=2323 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 13 01:34:20.311000 audit[2366]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.311000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5ca93af0 a2=0 a3=7ffd5ca93adc items=0 ppid=2323 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 13 01:34:20.312000 audit[2368]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.312000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffef7639440 a2=0 a3=7ffef763942c items=0 ppid=2323 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 13 01:34:20.313000 audit[2370]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.313000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd484b1cc0 a2=0 a3=7ffd484b1cac items=0 ppid=2323 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 13 01:34:20.314000 audit[2372]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.314000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffeeda9c820 a2=0 a3=7ffeeda9c80c items=0 ppid=2323 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 13 01:34:20.315000 audit[2374]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.315000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe77218f40 a2=0 a3=7ffe77218f2c items=0 ppid=2323 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 13 01:34:20.316000 audit[2376]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.316000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffe032fc440 a2=0 a3=7ffe032fc42c items=0 ppid=2323 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 13 01:34:20.317540 kubelet[2323]: I0213 01:34:20.317476 2323 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 13 01:34:20.317000 audit[2377]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.317000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe995df410 a2=0 a3=7ffe995df3fc items=0 ppid=2323 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 13 01:34:20.317000 audit[2378]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.317000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef8ebf640 a2=0 a3=7ffef8ebf62c items=0 ppid=2323 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 13 01:34:20.317000 audit[2379]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.317000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff306b5dc0 a2=0 a3=7fff306b5dac items=0 ppid=2323 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 13 01:34:20.317000 audit[2380]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.317000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3e168500 a2=0 a3=7ffc3e1684ec items=0 ppid=2323 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 13 01:34:20.318000 audit[2382]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:20.318000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc10926000 a2=0 a3=7ffc10925fec items=0 ppid=2323 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 13 01:34:20.318000 audit[2383]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.318000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd58f1ba60 a2=0 a3=7ffd58f1ba4c items=0 ppid=2323 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 13 01:34:20.319000 audit[2384]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.319000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd782a69d0 a2=0 a3=7ffd782a69bc items=0 ppid=2323 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 13 01:34:20.320000 audit[2386]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.320000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffeaf483540 a2=0 a3=7ffeaf48352c items=0 ppid=2323 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 13 01:34:20.320000 audit[2387]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.320000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff125a8a50 a2=0 a3=7fff125a8a3c items=0 ppid=2323 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 13 01:34:20.321000 audit[2388]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.321000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff36f18960 a2=0 a3=7fff36f1894c items=0 ppid=2323 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 13 01:34:20.322000 audit[2390]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.322000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd155ed180 a2=0 a3=7ffd155ed16c items=0 ppid=2323 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 13 01:34:20.323000 audit[2392]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.323000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd1e819870 a2=0 a3=7ffd1e81985c items=0 ppid=2323 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 13 01:34:20.324000 audit[2394]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.324000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc640be6b0 a2=0 a3=7ffc640be69c items=0 ppid=2323 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 13 01:34:20.325000 audit[2396]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.325000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffdbb49bc50 a2=0 a3=7ffdbb49bc3c items=0 ppid=2323 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 13 01:34:20.327000 audit[2398]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.327000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffeccc22300 a2=0 a3=7ffeccc222ec items=0 ppid=2323 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 13 01:34:20.328084 kubelet[2323]: I0213 01:34:20.328037 2323 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 13 01:34:20.328084 kubelet[2323]: I0213 01:34:20.328046 2323 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 13 01:34:20.328084 kubelet[2323]: I0213 01:34:20.328055 2323 kubelet.go:2113] "Starting kubelet main sync loop" Feb 13 01:34:20.328084 kubelet[2323]: E0213 01:34:20.328073 2323 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 13 01:34:20.328283 kubelet[2323]: W0213 01:34:20.328229 2323 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://147.75.90.7:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:20.328283 kubelet[2323]: E0213 01:34:20.328250 2323 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.90.7:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:20.327000 audit[2399]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.327000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff60bb7ec0 a2=0 a3=7fff60bb7eac items=0 ppid=2323 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 13 01:34:20.328000 audit[2400]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.328000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc64a67c90 a2=0 a3=7ffc64a67c7c items=0 ppid=2323 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 13 01:34:20.328000 audit[2401]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:20.328000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4c9c6840 a2=0 a3=7ffe4c9c682c items=0 ppid=2323 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:20.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 13 01:34:20.429293 kubelet[2323]: I0213 01:34:20.429248 2323 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:20.430324 kubelet[2323]: I0213 01:34:20.430287 2323 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:20.431171 kubelet[2323]: I0213 01:34:20.431122 2323 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:20.431374 kubelet[2323]: I0213 01:34:20.431348 2323 status_manager.go:698] "Failed to get status for pod" podUID=16f24b767103dda9d86620f8ce6010e5 pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" err="Get \"https://147.75.90.7:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\": dial tcp 147.75.90.7:6443: connect: connection refused" Feb 13 01:34:20.432073 kubelet[2323]: I0213 01:34:20.432063 2323 status_manager.go:698] "Failed to get status for pod" podUID=aa2fe78f52cf14b8b6d47d2cf0a6c0ae pod="kube-system/kube-scheduler-ci-3510.3.2-a-ab9b2e6956" err="Get \"https://147.75.90.7:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-a-ab9b2e6956\": dial tcp 147.75.90.7:6443: connect: connection refused" Feb 13 01:34:20.432914 kubelet[2323]: I0213 01:34:20.432874 2323 status_manager.go:698] "Failed to get status for pod" podUID=7e3cf7a62fb0e3c042c99af6b3bbf21c pod="kube-system/kube-apiserver-ci-3510.3.2-a-ab9b2e6956" err="Get \"https://147.75.90.7:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-a-ab9b2e6956\": dial tcp 147.75.90.7:6443: connect: connection refused" Feb 13 01:34:20.486343 kubelet[2323]: I0213 01:34:20.486265 2323 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/16f24b767103dda9d86620f8ce6010e5-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" (UID: \"16f24b767103dda9d86620f8ce6010e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:20.486343 kubelet[2323]: I0213 01:34:20.486332 2323 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/16f24b767103dda9d86620f8ce6010e5-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" (UID: \"16f24b767103dda9d86620f8ce6010e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:20.486603 kubelet[2323]: I0213 01:34:20.486375 2323 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/16f24b767103dda9d86620f8ce6010e5-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" (UID: \"16f24b767103dda9d86620f8ce6010e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:20.486603 kubelet[2323]: I0213 01:34:20.486417 2323 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/aa2fe78f52cf14b8b6d47d2cf0a6c0ae-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-ab9b2e6956\" (UID: \"aa2fe78f52cf14b8b6d47d2cf0a6c0ae\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:20.486603 kubelet[2323]: I0213 01:34:20.486454 2323 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7e3cf7a62fb0e3c042c99af6b3bbf21c-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-ab9b2e6956\" (UID: \"7e3cf7a62fb0e3c042c99af6b3bbf21c\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:20.486603 kubelet[2323]: I0213 01:34:20.486538 2323 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7e3cf7a62fb0e3c042c99af6b3bbf21c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-ab9b2e6956\" (UID: \"7e3cf7a62fb0e3c042c99af6b3bbf21c\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:20.486603 kubelet[2323]: I0213 01:34:20.486597 2323 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/16f24b767103dda9d86620f8ce6010e5-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" (UID: \"16f24b767103dda9d86620f8ce6010e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:20.486918 kubelet[2323]: I0213 01:34:20.486653 2323 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/16f24b767103dda9d86620f8ce6010e5-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" (UID: \"16f24b767103dda9d86620f8ce6010e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:20.486918 kubelet[2323]: I0213 01:34:20.486693 2323 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7e3cf7a62fb0e3c042c99af6b3bbf21c-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-ab9b2e6956\" (UID: \"7e3cf7a62fb0e3c042c99af6b3bbf21c\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:20.734895 env[1557]: time="2024-02-13T01:34:20.734662417Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-ab9b2e6956,Uid:16f24b767103dda9d86620f8ce6010e5,Namespace:kube-system,Attempt:0,}" Feb 13 01:34:20.734895 env[1557]: time="2024-02-13T01:34:20.734667069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-ab9b2e6956,Uid:aa2fe78f52cf14b8b6d47d2cf0a6c0ae,Namespace:kube-system,Attempt:0,}" Feb 13 01:34:20.735766 env[1557]: time="2024-02-13T01:34:20.734890407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-ab9b2e6956,Uid:7e3cf7a62fb0e3c042c99af6b3bbf21c,Namespace:kube-system,Attempt:0,}" Feb 13 01:34:20.763836 kubelet[2323]: W0213 01:34:20.763686 2323 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://147.75.90.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-ab9b2e6956&limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:20.763836 kubelet[2323]: E0213 01:34:20.763817 2323 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.90.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-ab9b2e6956&limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:20.903666 kubelet[2323]: W0213 01:34:20.903462 2323 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://147.75.90.7:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:20.903666 kubelet[2323]: E0213 01:34:20.903606 2323 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.90.7:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:20.983868 kubelet[2323]: E0213 01:34:20.983749 2323 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://147.75.90.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-ab9b2e6956?timeout=10s": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:21.069899 kubelet[2323]: W0213 01:34:21.066979 2323 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://147.75.90.7:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:21.069899 kubelet[2323]: E0213 01:34:21.067109 2323 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.90.7:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.90.7:6443: connect: connection refused Feb 13 01:34:21.090779 kubelet[2323]: I0213 01:34:21.090691 2323 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:21.091394 kubelet[2323]: E0213 01:34:21.091318 2323 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.90.7:6443/api/v1/nodes\": dial tcp 147.75.90.7:6443: connect: connection refused" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:21.275827 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2927966615.mount: Deactivated successfully. Feb 13 01:34:21.277022 env[1557]: time="2024-02-13T01:34:21.276971527Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.278174 env[1557]: time="2024-02-13T01:34:21.278139476Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.278758 env[1557]: time="2024-02-13T01:34:21.278707304Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.279484 env[1557]: time="2024-02-13T01:34:21.279437103Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.279892 env[1557]: time="2024-02-13T01:34:21.279843160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.280657 env[1557]: time="2024-02-13T01:34:21.280620579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.282344 env[1557]: time="2024-02-13T01:34:21.282305594Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.283999 env[1557]: time="2024-02-13T01:34:21.283963166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.284905 env[1557]: time="2024-02-13T01:34:21.284865702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.285326 env[1557]: time="2024-02-13T01:34:21.285284905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.285836 env[1557]: time="2024-02-13T01:34:21.285801655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.286268 env[1557]: time="2024-02-13T01:34:21.286232580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:21.291299 env[1557]: time="2024-02-13T01:34:21.291265436Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:34:21.291299 env[1557]: time="2024-02-13T01:34:21.291287582Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:34:21.291299 env[1557]: time="2024-02-13T01:34:21.291294529Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:34:21.291416 env[1557]: time="2024-02-13T01:34:21.291360457Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95aa6d7c72f205078cea22f1ab6f3a9ea0cdf88bcec0bd1b040a4912508ae93d pid=2415 runtime=io.containerd.runc.v2 Feb 13 01:34:21.291559 env[1557]: time="2024-02-13T01:34:21.291539628Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:34:21.291559 env[1557]: time="2024-02-13T01:34:21.291555906Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:34:21.291607 env[1557]: time="2024-02-13T01:34:21.291562560Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:34:21.291660 env[1557]: time="2024-02-13T01:34:21.291635877Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/859149b849d66632b5a6b5fdbbbf250dbacd273a9c5ed899621829da0cb80bd9 pid=2416 runtime=io.containerd.runc.v2 Feb 13 01:34:21.293820 env[1557]: time="2024-02-13T01:34:21.293759232Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:34:21.293820 env[1557]: time="2024-02-13T01:34:21.293780407Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:34:21.293820 env[1557]: time="2024-02-13T01:34:21.293787058Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:34:21.293932 env[1557]: time="2024-02-13T01:34:21.293849872Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fad7931bfe131c93337530199ca1d6e14bb53b6e694ddc42ae193e98f59ea597 pid=2443 runtime=io.containerd.runc.v2 Feb 13 01:34:21.320996 env[1557]: time="2024-02-13T01:34:21.320902783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-ab9b2e6956,Uid:aa2fe78f52cf14b8b6d47d2cf0a6c0ae,Namespace:kube-system,Attempt:0,} returns sandbox id \"95aa6d7c72f205078cea22f1ab6f3a9ea0cdf88bcec0bd1b040a4912508ae93d\"" Feb 13 01:34:21.322034 env[1557]: time="2024-02-13T01:34:21.322017001Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-ab9b2e6956,Uid:7e3cf7a62fb0e3c042c99af6b3bbf21c,Namespace:kube-system,Attempt:0,} returns sandbox id \"859149b849d66632b5a6b5fdbbbf250dbacd273a9c5ed899621829da0cb80bd9\"" Feb 13 01:34:21.322189 env[1557]: time="2024-02-13T01:34:21.322172607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-ab9b2e6956,Uid:16f24b767103dda9d86620f8ce6010e5,Namespace:kube-system,Attempt:0,} returns sandbox id \"fad7931bfe131c93337530199ca1d6e14bb53b6e694ddc42ae193e98f59ea597\"" Feb 13 01:34:21.322655 env[1557]: time="2024-02-13T01:34:21.322637930Z" level=info msg="CreateContainer within sandbox \"95aa6d7c72f205078cea22f1ab6f3a9ea0cdf88bcec0bd1b040a4912508ae93d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 13 01:34:21.323042 env[1557]: time="2024-02-13T01:34:21.323006826Z" level=info msg="CreateContainer within sandbox \"859149b849d66632b5a6b5fdbbbf250dbacd273a9c5ed899621829da0cb80bd9\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 13 01:34:21.323776 env[1557]: time="2024-02-13T01:34:21.323761331Z" level=info msg="CreateContainer within sandbox \"fad7931bfe131c93337530199ca1d6e14bb53b6e694ddc42ae193e98f59ea597\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 13 01:34:21.329547 env[1557]: time="2024-02-13T01:34:21.329503565Z" level=info msg="CreateContainer within sandbox \"95aa6d7c72f205078cea22f1ab6f3a9ea0cdf88bcec0bd1b040a4912508ae93d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"5518f9f49a14b6b4248b40c0ae499183a017cc3b4c58a20ea3295d4a978a9ff5\"" Feb 13 01:34:21.329840 env[1557]: time="2024-02-13T01:34:21.329793286Z" level=info msg="StartContainer for \"5518f9f49a14b6b4248b40c0ae499183a017cc3b4c58a20ea3295d4a978a9ff5\"" Feb 13 01:34:21.330572 env[1557]: time="2024-02-13T01:34:21.330553925Z" level=info msg="CreateContainer within sandbox \"859149b849d66632b5a6b5fdbbbf250dbacd273a9c5ed899621829da0cb80bd9\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"5805e9cc2fe62a2098985152dcc73fe8f3140f0aa9804c61365dbd112a9b4d43\"" Feb 13 01:34:21.330783 env[1557]: time="2024-02-13T01:34:21.330744111Z" level=info msg="StartContainer for \"5805e9cc2fe62a2098985152dcc73fe8f3140f0aa9804c61365dbd112a9b4d43\"" Feb 13 01:34:21.331368 env[1557]: time="2024-02-13T01:34:21.331355643Z" level=info msg="CreateContainer within sandbox \"fad7931bfe131c93337530199ca1d6e14bb53b6e694ddc42ae193e98f59ea597\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"7fc2c690ca85852fba59827313b4ae905ae8996c8ea27c6cb1b6d46462c5249a\"" Feb 13 01:34:21.331514 env[1557]: time="2024-02-13T01:34:21.331502693Z" level=info msg="StartContainer for \"7fc2c690ca85852fba59827313b4ae905ae8996c8ea27c6cb1b6d46462c5249a\"" Feb 13 01:34:21.362670 env[1557]: time="2024-02-13T01:34:21.362641768Z" level=info msg="StartContainer for \"5518f9f49a14b6b4248b40c0ae499183a017cc3b4c58a20ea3295d4a978a9ff5\" returns successfully" Feb 13 01:34:21.362776 env[1557]: time="2024-02-13T01:34:21.362698122Z" level=info msg="StartContainer for \"7fc2c690ca85852fba59827313b4ae905ae8996c8ea27c6cb1b6d46462c5249a\" returns successfully" Feb 13 01:34:21.362776 env[1557]: time="2024-02-13T01:34:21.362740303Z" level=info msg="StartContainer for \"5805e9cc2fe62a2098985152dcc73fe8f3140f0aa9804c61365dbd112a9b4d43\" returns successfully" Feb 13 01:34:22.592571 kubelet[2323]: E0213 01:34:22.592480 2323 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-ab9b2e6956\" not found" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:22.695569 kubelet[2323]: I0213 01:34:22.695515 2323 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:22.995831 kubelet[2323]: E0213 01:34:22.995605 2323 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b3483122eb64d8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 579999448, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 579999448, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 01:34:23.052712 kubelet[2323]: E0213 01:34:23.052489 2323 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b3483122eef7fd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 580233725, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 580233725, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 01:34:23.109701 kubelet[2323]: E0213 01:34:23.109490 2323 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b3483126b101ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-ab9b2e6956 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 643281901, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 643281901, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 01:34:23.167396 kubelet[2323]: E0213 01:34:23.167201 2323 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b3483126b11249", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-ab9b2e6956 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 643286089, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 643286089, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 01:34:23.187718 kubelet[2323]: I0213 01:34:23.187667 2323 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:23.203015 kubelet[2323]: E0213 01:34:23.202968 2323 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-ab9b2e6956\" not found" Feb 13 01:34:23.221958 kubelet[2323]: E0213 01:34:23.221912 2323 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b3483126b11881", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-a-ab9b2e6956 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 643287681, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 643287681, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 01:34:23.277578 kubelet[2323]: E0213 01:34:23.277217 2323 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b3483126b101ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-ab9b2e6956 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 643281901, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 682222137, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 01:34:23.303837 kubelet[2323]: E0213 01:34:23.303795 2323 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-ab9b2e6956\" not found" Feb 13 01:34:23.338320 kubelet[2323]: E0213 01:34:23.338126 2323 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b3483126b11249", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-ab9b2e6956 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 643286089, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 682224648, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 01:34:23.398881 kubelet[2323]: E0213 01:34:23.398635 2323 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b3483126b11881", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-a-ab9b2e6956 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 643287681, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 682225973, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 01:34:23.405041 kubelet[2323]: E0213 01:34:23.404983 2323 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-ab9b2e6956\" not found" Feb 13 01:34:23.455604 kubelet[2323]: E0213 01:34:23.455363 2323 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b34831343d9038", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 870597176, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 870597176, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 01:34:23.505408 kubelet[2323]: E0213 01:34:23.505354 2323 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-ab9b2e6956\" not found" Feb 13 01:34:23.606143 kubelet[2323]: E0213 01:34:23.605965 2323 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-ab9b2e6956\" not found" Feb 13 01:34:23.706818 kubelet[2323]: E0213 01:34:23.706753 2323 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-ab9b2e6956\" not found" Feb 13 01:34:23.794177 kubelet[2323]: E0213 01:34:23.793972 2323 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ab9b2e6956.17b3483126b101ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ab9b2e6956", UID:"ci-3510.3.2-a-ab9b2e6956", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-ab9b2e6956 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ab9b2e6956"}, FirstTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 643281901, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 1, 34, 19, 884443557, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 01:34:24.582337 kubelet[2323]: I0213 01:34:24.582215 2323 apiserver.go:52] "Watching apiserver" Feb 13 01:34:25.082031 kubelet[2323]: I0213 01:34:25.081923 2323 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 13 01:34:25.113393 kubelet[2323]: I0213 01:34:25.113287 2323 reconciler.go:41] "Reconciler: start to sync state" Feb 13 01:34:25.358605 systemd[1]: Reloading. Feb 13 01:34:25.415681 /usr/lib/systemd/system-generators/torcx-generator[2691]: time="2024-02-13T01:34:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 01:34:25.415701 /usr/lib/systemd/system-generators/torcx-generator[2691]: time="2024-02-13T01:34:25Z" level=info msg="torcx already run" Feb 13 01:34:25.487907 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 01:34:25.487919 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 01:34:25.502786 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 01:34:25.561956 kubelet[2323]: I0213 01:34:25.561883 2323 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 01:34:25.561911 systemd[1]: Stopping kubelet.service... Feb 13 01:34:25.575046 systemd[1]: kubelet.service: Deactivated successfully. Feb 13 01:34:25.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:25.575203 systemd[1]: Stopped kubelet.service. Feb 13 01:34:25.576135 systemd[1]: Started kubelet.service. Feb 13 01:34:25.598965 kubelet[2758]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 13 01:34:25.598965 kubelet[2758]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 01:34:25.599244 kubelet[2758]: I0213 01:34:25.598989 2758 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 13 01:34:25.599903 kubelet[2758]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 13 01:34:25.599903 kubelet[2758]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 01:34:25.601537 kubelet[2758]: I0213 01:34:25.601526 2758 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 13 01:34:25.601537 kubelet[2758]: I0213 01:34:25.601537 2758 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 13 01:34:25.601604 kernel: kauditd_printk_skb: 101 callbacks suppressed Feb 13 01:34:25.601629 kernel: audit: type=1131 audit(1707788065.573:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:25.601653 kubelet[2758]: I0213 01:34:25.601643 2758 server.go:836] "Client rotation is on, will bootstrap in background" Feb 13 01:34:25.602306 kubelet[2758]: I0213 01:34:25.602299 2758 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 13 01:34:25.602677 kubelet[2758]: I0213 01:34:25.602667 2758 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 01:34:25.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:25.729036 kernel: audit: type=1130 audit(1707788065.574:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:25.735808 kubelet[2758]: I0213 01:34:25.735790 2758 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 13 01:34:25.736144 kubelet[2758]: I0213 01:34:25.736107 2758 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 13 01:34:25.736178 kubelet[2758]: I0213 01:34:25.736170 2758 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 13 01:34:25.736243 kubelet[2758]: I0213 01:34:25.736188 2758 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 13 01:34:25.736243 kubelet[2758]: I0213 01:34:25.736201 2758 container_manager_linux.go:308] "Creating device plugin manager" Feb 13 01:34:25.736243 kubelet[2758]: I0213 01:34:25.736226 2758 state_mem.go:36] "Initialized new in-memory state store" Feb 13 01:34:25.737625 kubelet[2758]: I0213 01:34:25.737587 2758 kubelet.go:398] "Attempting to sync node with API server" Feb 13 01:34:25.737625 kubelet[2758]: I0213 01:34:25.737597 2758 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 13 01:34:25.737625 kubelet[2758]: I0213 01:34:25.737609 2758 kubelet.go:297] "Adding apiserver pod source" Feb 13 01:34:25.737625 kubelet[2758]: I0213 01:34:25.737620 2758 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 13 01:34:25.737926 kubelet[2758]: I0213 01:34:25.737884 2758 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 13 01:34:25.738194 kubelet[2758]: I0213 01:34:25.738159 2758 server.go:1186] "Started kubelet" Feb 13 01:34:25.738279 kubelet[2758]: I0213 01:34:25.738246 2758 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 13 01:34:25.738466 kubelet[2758]: E0213 01:34:25.738457 2758 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 13 01:34:25.738507 kubelet[2758]: E0213 01:34:25.738470 2758 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 13 01:34:25.738788 kubelet[2758]: I0213 01:34:25.738781 2758 server.go:451] "Adding debug handlers to kubelet server" Feb 13 01:34:25.738000 audit[2758]: AVC avc: denied { mac_admin } for pid=2758 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:34:25.738966 kubelet[2758]: I0213 01:34:25.738903 2758 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 13 01:34:25.738966 kubelet[2758]: I0213 01:34:25.738920 2758 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 13 01:34:25.738966 kubelet[2758]: I0213 01:34:25.738932 2758 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 13 01:34:25.739040 kubelet[2758]: I0213 01:34:25.739002 2758 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 13 01:34:25.739040 kubelet[2758]: I0213 01:34:25.739027 2758 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 13 01:34:25.753218 kubelet[2758]: I0213 01:34:25.753204 2758 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 13 01:34:25.759500 kubelet[2758]: I0213 01:34:25.759457 2758 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 13 01:34:25.759500 kubelet[2758]: I0213 01:34:25.759470 2758 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 13 01:34:25.759500 kubelet[2758]: I0213 01:34:25.759481 2758 kubelet.go:2113] "Starting kubelet main sync loop" Feb 13 01:34:25.759608 kubelet[2758]: E0213 01:34:25.759511 2758 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 13 01:34:25.772034 kubelet[2758]: I0213 01:34:25.771988 2758 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 13 01:34:25.772034 kubelet[2758]: I0213 01:34:25.771999 2758 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 13 01:34:25.772034 kubelet[2758]: I0213 01:34:25.772008 2758 state_mem.go:36] "Initialized new in-memory state store" Feb 13 01:34:25.772157 kubelet[2758]: I0213 01:34:25.772103 2758 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 13 01:34:25.772157 kubelet[2758]: I0213 01:34:25.772112 2758 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 13 01:34:25.772157 kubelet[2758]: I0213 01:34:25.772115 2758 policy_none.go:49] "None policy: Start" Feb 13 01:34:25.772394 kubelet[2758]: I0213 01:34:25.772386 2758 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 13 01:34:25.772394 kubelet[2758]: I0213 01:34:25.772396 2758 state_mem.go:35] "Initializing new in-memory state store" Feb 13 01:34:25.772462 kubelet[2758]: I0213 01:34:25.772458 2758 state_mem.go:75] "Updated machine memory state" Feb 13 01:34:25.773116 kubelet[2758]: I0213 01:34:25.773105 2758 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 13 01:34:25.773160 kubelet[2758]: I0213 01:34:25.773134 2758 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 13 01:34:25.773243 kubelet[2758]: I0213 01:34:25.773236 2758 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 13 01:34:25.738000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 01:34:25.836558 kernel: audit: type=1400 audit(1707788065.738:223): avc: denied { mac_admin } for pid=2758 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:34:25.836606 kernel: audit: type=1401 audit(1707788065.738:223): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 01:34:25.836623 kernel: audit: type=1300 audit(1707788065.738:223): arch=c000003e syscall=188 success=no exit=-22 a0=c000dfcf90 a1=c00005dae8 a2=c000dfcf60 a3=25 items=0 ppid=1 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:25.738000 audit[2758]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dfcf90 a1=c00005dae8 a2=c000dfcf60 a3=25 items=0 ppid=1 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:25.841165 kubelet[2758]: I0213 01:34:25.841154 2758 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.846215 kubelet[2758]: I0213 01:34:25.846178 2758 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.846215 kubelet[2758]: I0213 01:34:25.846211 2758 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.860546 kubelet[2758]: I0213 01:34:25.860506 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:25.860546 kubelet[2758]: I0213 01:34:25.860546 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:25.860620 kubelet[2758]: I0213 01:34:25.860564 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:25.864920 kubelet[2758]: E0213 01:34:25.864906 2758 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-ab9b2e6956\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.738000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 01:34:25.940371 kubelet[2758]: I0213 01:34:25.940360 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/16f24b767103dda9d86620f8ce6010e5-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" (UID: \"16f24b767103dda9d86620f8ce6010e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.940427 kubelet[2758]: I0213 01:34:25.940381 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/16f24b767103dda9d86620f8ce6010e5-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" (UID: \"16f24b767103dda9d86620f8ce6010e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.940427 kubelet[2758]: I0213 01:34:25.940395 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7e3cf7a62fb0e3c042c99af6b3bbf21c-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-ab9b2e6956\" (UID: \"7e3cf7a62fb0e3c042c99af6b3bbf21c\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.940427 kubelet[2758]: I0213 01:34:25.940408 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7e3cf7a62fb0e3c042c99af6b3bbf21c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-ab9b2e6956\" (UID: \"7e3cf7a62fb0e3c042c99af6b3bbf21c\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.940427 kubelet[2758]: I0213 01:34:25.940420 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/16f24b767103dda9d86620f8ce6010e5-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" (UID: \"16f24b767103dda9d86620f8ce6010e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.940504 kubelet[2758]: I0213 01:34:25.940431 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/16f24b767103dda9d86620f8ce6010e5-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" (UID: \"16f24b767103dda9d86620f8ce6010e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.940504 kubelet[2758]: I0213 01:34:25.940443 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/16f24b767103dda9d86620f8ce6010e5-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" (UID: \"16f24b767103dda9d86620f8ce6010e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.940504 kubelet[2758]: I0213 01:34:25.940454 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/aa2fe78f52cf14b8b6d47d2cf0a6c0ae-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-ab9b2e6956\" (UID: \"aa2fe78f52cf14b8b6d47d2cf0a6c0ae\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.940504 kubelet[2758]: I0213 01:34:25.940465 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7e3cf7a62fb0e3c042c99af6b3bbf21c-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-ab9b2e6956\" (UID: \"7e3cf7a62fb0e3c042c99af6b3bbf21c\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:25.954470 kubelet[2758]: E0213 01:34:25.954460 2758 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:26.005718 update_engine[1545]: I0213 01:34:26.005641 1545 update_attempter.cc:509] Updating boot flags... Feb 13 01:34:25.738000 audit[2758]: AVC avc: denied { mac_admin } for pid=2758 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:34:26.089408 kernel: audit: type=1327 audit(1707788065.738:223): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 01:34:26.089469 kernel: audit: type=1400 audit(1707788065.738:224): avc: denied { mac_admin } for pid=2758 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:34:26.089482 kernel: audit: type=1401 audit(1707788065.738:224): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 01:34:25.738000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 01:34:26.122010 kernel: audit: type=1300 audit(1707788065.738:224): arch=c000003e syscall=188 success=no exit=-22 a0=c000a8d100 a1=c00005db00 a2=c000dfd020 a3=25 items=0 ppid=1 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:25.738000 audit[2758]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a8d100 a1=c00005db00 a2=c000dfd020 a3=25 items=0 ppid=1 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:25.738000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 01:34:26.308413 kernel: audit: type=1327 audit(1707788065.738:224): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 01:34:25.772000 audit[2758]: AVC avc: denied { mac_admin } for pid=2758 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:34:25.772000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 01:34:25.772000 audit[2758]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001262600 a1=c000fe3110 a2=c0012625d0 a3=25 items=0 ppid=1 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:25.772000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 01:34:26.738672 kubelet[2758]: I0213 01:34:26.738561 2758 apiserver.go:52] "Watching apiserver" Feb 13 01:34:26.840002 kubelet[2758]: I0213 01:34:26.839930 2758 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 13 01:34:26.845039 kubelet[2758]: I0213 01:34:26.844993 2758 reconciler.go:41] "Reconciler: start to sync state" Feb 13 01:34:27.146467 kubelet[2758]: E0213 01:34:27.146310 2758 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-ab9b2e6956\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:27.342880 kubelet[2758]: E0213 01:34:27.342821 2758 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-ab9b2e6956\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:27.546044 kubelet[2758]: E0213 01:34:27.545948 2758 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-ab9b2e6956\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-ab9b2e6956" Feb 13 01:34:27.772700 kubelet[2758]: I0213 01:34:27.772662 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-ab9b2e6956" podStartSLOduration=1.772581959 pod.CreationTimestamp="2024-02-13 01:34:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:34:27.772555811 +0000 UTC m=+2.194585835" watchObservedRunningTime="2024-02-13 01:34:27.772581959 +0000 UTC m=+2.194611965" Feb 13 01:34:28.146512 kubelet[2758]: I0213 01:34:28.146495 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ab9b2e6956" podStartSLOduration=4.146472977 pod.CreationTimestamp="2024-02-13 01:34:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:34:28.146355276 +0000 UTC m=+2.568385262" watchObservedRunningTime="2024-02-13 01:34:28.146472977 +0000 UTC m=+2.568502955" Feb 13 01:34:28.542487 kubelet[2758]: I0213 01:34:28.542472 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-ab9b2e6956" podStartSLOduration=4.54245007 pod.CreationTimestamp="2024-02-13 01:34:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:34:28.542240538 +0000 UTC m=+2.964270520" watchObservedRunningTime="2024-02-13 01:34:28.54245007 +0000 UTC m=+2.964480052" Feb 13 01:34:30.941344 sudo[1761]: pam_unix(sudo:session): session closed for user root Feb 13 01:34:30.940000 audit[1761]: USER_END pid=1761 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:34:30.942283 sshd[1755]: pam_unix(sshd:session): session closed for user core Feb 13 01:34:30.943963 systemd[1]: sshd@8-147.75.90.7:22-139.178.68.195:60224.service: Deactivated successfully. Feb 13 01:34:30.944687 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 01:34:30.944718 systemd-logind[1543]: Session 11 logged out. Waiting for processes to exit. Feb 13 01:34:30.945435 systemd-logind[1543]: Removed session 11. Feb 13 01:34:30.967187 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 01:34:30.967220 kernel: audit: type=1106 audit(1707788070.940:226): pid=1761 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:34:30.940000 audit[1761]: CRED_DISP pid=1761 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:34:31.139645 kernel: audit: type=1104 audit(1707788070.940:227): pid=1761 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 01:34:31.139674 kernel: audit: type=1106 audit(1707788070.942:228): pid=1755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:34:30.942000 audit[1755]: USER_END pid=1755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:34:31.233581 kernel: audit: type=1104 audit(1707788070.942:229): pid=1755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:34:30.942000 audit[1755]: CRED_DISP pid=1755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:34:31.321525 kernel: audit: type=1131 audit(1707788070.943:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.90.7:22-139.178.68.195:60224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:30.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.90.7:22-139.178.68.195:60224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:38.454443 kubelet[2758]: I0213 01:34:38.454421 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:38.507747 kubelet[2758]: I0213 01:34:38.495858 2758 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 13 01:34:38.507747 kubelet[2758]: I0213 01:34:38.498596 2758 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 13 01:34:38.508006 env[1557]: time="2024-02-13T01:34:38.497470904Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 13 01:34:38.618499 kubelet[2758]: I0213 01:34:38.618448 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9a3dfd30-b441-4941-8ec1-26f9928abe73-var-lib-calico\") pod \"tigera-operator-cfc98749c-245rs\" (UID: \"9a3dfd30-b441-4941-8ec1-26f9928abe73\") " pod="tigera-operator/tigera-operator-cfc98749c-245rs" Feb 13 01:34:38.618792 kubelet[2758]: I0213 01:34:38.618554 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5fc85\" (UniqueName: \"kubernetes.io/projected/9a3dfd30-b441-4941-8ec1-26f9928abe73-kube-api-access-5fc85\") pod \"tigera-operator-cfc98749c-245rs\" (UID: \"9a3dfd30-b441-4941-8ec1-26f9928abe73\") " pod="tigera-operator/tigera-operator-cfc98749c-245rs" Feb 13 01:34:38.740056 kubelet[2758]: I0213 01:34:38.739887 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:38.757934 env[1557]: time="2024-02-13T01:34:38.757833320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-245rs,Uid:9a3dfd30-b441-4941-8ec1-26f9928abe73,Namespace:tigera-operator,Attempt:0,}" Feb 13 01:34:38.775812 env[1557]: time="2024-02-13T01:34:38.775668254Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:34:38.775812 env[1557]: time="2024-02-13T01:34:38.775749602Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:34:38.775812 env[1557]: time="2024-02-13T01:34:38.775778217Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:34:38.776216 env[1557]: time="2024-02-13T01:34:38.776048055Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/268fc91b427479aef40dd148b46715e4e67a60f332a45558911dcdae037665aa pid=2973 runtime=io.containerd.runc.v2 Feb 13 01:34:38.841858 env[1557]: time="2024-02-13T01:34:38.841828398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-245rs,Uid:9a3dfd30-b441-4941-8ec1-26f9928abe73,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"268fc91b427479aef40dd148b46715e4e67a60f332a45558911dcdae037665aa\"" Feb 13 01:34:38.842652 env[1557]: time="2024-02-13T01:34:38.842637759Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 13 01:34:38.920609 kubelet[2758]: I0213 01:34:38.920506 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4024d166-b9ee-4c69-976c-85931d88d7ee-xtables-lock\") pod \"kube-proxy-wjrhm\" (UID: \"4024d166-b9ee-4c69-976c-85931d88d7ee\") " pod="kube-system/kube-proxy-wjrhm" Feb 13 01:34:38.920609 kubelet[2758]: I0213 01:34:38.920627 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4024d166-b9ee-4c69-976c-85931d88d7ee-lib-modules\") pod \"kube-proxy-wjrhm\" (UID: \"4024d166-b9ee-4c69-976c-85931d88d7ee\") " pod="kube-system/kube-proxy-wjrhm" Feb 13 01:34:38.921061 kubelet[2758]: I0213 01:34:38.920727 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4024d166-b9ee-4c69-976c-85931d88d7ee-kube-proxy\") pod \"kube-proxy-wjrhm\" (UID: \"4024d166-b9ee-4c69-976c-85931d88d7ee\") " pod="kube-system/kube-proxy-wjrhm" Feb 13 01:34:38.921061 kubelet[2758]: I0213 01:34:38.920802 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xcllm\" (UniqueName: \"kubernetes.io/projected/4024d166-b9ee-4c69-976c-85931d88d7ee-kube-api-access-xcllm\") pod \"kube-proxy-wjrhm\" (UID: \"4024d166-b9ee-4c69-976c-85931d88d7ee\") " pod="kube-system/kube-proxy-wjrhm" Feb 13 01:34:39.048869 env[1557]: time="2024-02-13T01:34:39.048642878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wjrhm,Uid:4024d166-b9ee-4c69-976c-85931d88d7ee,Namespace:kube-system,Attempt:0,}" Feb 13 01:34:39.071698 env[1557]: time="2024-02-13T01:34:39.071523428Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:34:39.071962 env[1557]: time="2024-02-13T01:34:39.071660411Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:34:39.071962 env[1557]: time="2024-02-13T01:34:39.071731451Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:34:39.072367 env[1557]: time="2024-02-13T01:34:39.072218035Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9791bfaee4f635b0c76c981bc25d912f6899a24b8eaa0d2349ce167d06f7e750 pid=3014 runtime=io.containerd.runc.v2 Feb 13 01:34:39.133067 env[1557]: time="2024-02-13T01:34:39.133012287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wjrhm,Uid:4024d166-b9ee-4c69-976c-85931d88d7ee,Namespace:kube-system,Attempt:0,} returns sandbox id \"9791bfaee4f635b0c76c981bc25d912f6899a24b8eaa0d2349ce167d06f7e750\"" Feb 13 01:34:39.135714 env[1557]: time="2024-02-13T01:34:39.135669906Z" level=info msg="CreateContainer within sandbox \"9791bfaee4f635b0c76c981bc25d912f6899a24b8eaa0d2349ce167d06f7e750\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 13 01:34:39.148277 env[1557]: time="2024-02-13T01:34:39.148191411Z" level=info msg="CreateContainer within sandbox \"9791bfaee4f635b0c76c981bc25d912f6899a24b8eaa0d2349ce167d06f7e750\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c9c5987e4c8550945e43f046fb1737a970918ecdbc657554c01266f8ad768b24\"" Feb 13 01:34:39.148899 env[1557]: time="2024-02-13T01:34:39.148846754Z" level=info msg="StartContainer for \"c9c5987e4c8550945e43f046fb1737a970918ecdbc657554c01266f8ad768b24\"" Feb 13 01:34:39.206143 env[1557]: time="2024-02-13T01:34:39.206081828Z" level=info msg="StartContainer for \"c9c5987e4c8550945e43f046fb1737a970918ecdbc657554c01266f8ad768b24\" returns successfully" Feb 13 01:34:39.267000 audit[3114]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=3114 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:39.267000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe285b28d0 a2=0 a3=7ffe285b28bc items=0 ppid=3066 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.425676 kernel: audit: type=1325 audit(1707788079.267:231): table=mangle:59 family=10 entries=1 op=nft_register_chain pid=3114 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:39.425728 kernel: audit: type=1300 audit(1707788079.267:231): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe285b28d0 a2=0 a3=7ffe285b28bc items=0 ppid=3066 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.425745 kernel: audit: type=1327 audit(1707788079.267:231): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 01:34:39.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 01:34:39.268000 audit[3115]: NETFILTER_CFG table=mangle:60 family=2 entries=1 op=nft_register_chain pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.541599 kernel: audit: type=1325 audit(1707788079.268:232): table=mangle:60 family=2 entries=1 op=nft_register_chain pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.541652 kernel: audit: type=1300 audit(1707788079.268:232): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd02aeb610 a2=0 a3=7ffd02aeb5fc items=0 ppid=3066 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.268000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd02aeb610 a2=0 a3=7ffd02aeb5fc items=0 ppid=3066 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.637845 kernel: audit: type=1327 audit(1707788079.268:232): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 01:34:39.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 01:34:39.695899 kernel: audit: type=1325 audit(1707788079.269:233): table=nat:61 family=2 entries=1 op=nft_register_chain pid=3120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.269000 audit[3120]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.753574 kernel: audit: type=1300 audit(1707788079.269:233): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc75511470 a2=0 a3=7ffc7551145c items=0 ppid=3066 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.269000 audit[3120]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc75511470 a2=0 a3=7ffc7551145c items=0 ppid=3066 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.797141 kubelet[2758]: I0213 01:34:39.797129 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wjrhm" podStartSLOduration=1.7971099590000001 pod.CreationTimestamp="2024-02-13 01:34:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:34:39.796818443 +0000 UTC m=+14.218848428" watchObservedRunningTime="2024-02-13 01:34:39.797109959 +0000 UTC m=+14.219139938" Feb 13 01:34:39.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 01:34:39.908355 kernel: audit: type=1327 audit(1707788079.269:233): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 01:34:39.908390 kernel: audit: type=1325 audit(1707788079.269:234): table=nat:62 family=10 entries=1 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:39.269000 audit[3119]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:39.269000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe841a6c10 a2=0 a3=7ffe841a6bfc items=0 ppid=3066 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 01:34:39.271000 audit[3121]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_chain pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.271000 audit[3121]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8d16f800 a2=0 a3=7fff8d16f7ec items=0 ppid=3066 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 13 01:34:39.271000 audit[3122]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=3122 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:39.271000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd328ae3c0 a2=0 a3=7ffd328ae3ac items=0 ppid=3066 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 13 01:34:39.374000 audit[3123]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.374000 audit[3123]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffecae68c20 a2=0 a3=7ffecae68c0c items=0 ppid=3066 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 13 01:34:39.375000 audit[3125]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.375000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc6f5c1b20 a2=0 a3=7ffc6f5c1b0c items=0 ppid=3066 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 13 01:34:39.377000 audit[3128]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.377000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffff1c328c0 a2=0 a3=7ffff1c328ac items=0 ppid=3066 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 13 01:34:39.378000 audit[3129]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=3129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.378000 audit[3129]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3f705020 a2=0 a3=7ffc3f70500c items=0 ppid=3066 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 13 01:34:39.379000 audit[3131]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.379000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc75fb3b50 a2=0 a3=7ffc75fb3b3c items=0 ppid=3066 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 13 01:34:39.380000 audit[3132]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.380000 audit[3132]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc58762b60 a2=0 a3=7ffc58762b4c items=0 ppid=3066 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 13 01:34:39.381000 audit[3134]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.381000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdb792d060 a2=0 a3=7ffdb792d04c items=0 ppid=3066 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 13 01:34:39.383000 audit[3137]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.383000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffc18068b0 a2=0 a3=7fffc180689c items=0 ppid=3066 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.383000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 13 01:34:39.383000 audit[3138]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.383000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc337781c0 a2=0 a3=7ffc337781ac items=0 ppid=3066 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.383000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 13 01:34:39.385000 audit[3140]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.385000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc078042c0 a2=0 a3=7ffc078042ac items=0 ppid=3066 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 13 01:34:39.385000 audit[3141]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=3141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.385000 audit[3141]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8b767ef0 a2=0 a3=7ffc8b767edc items=0 ppid=3066 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 13 01:34:39.966000 audit[3143]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.966000 audit[3143]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6d475af0 a2=0 a3=7ffe6d475adc items=0 ppid=3066 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 01:34:39.968000 audit[3146]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.968000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe84bb0880 a2=0 a3=7ffe84bb086c items=0 ppid=3066 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 01:34:39.970000 audit[3149]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=3149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.970000 audit[3149]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb54788c0 a2=0 a3=7ffeb54788ac items=0 ppid=3066 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 13 01:34:39.970000 audit[3150]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=3150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.970000 audit[3150]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffce3963ca0 a2=0 a3=7ffce3963c8c items=0 ppid=3066 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 13 01:34:39.972000 audit[3152]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=3152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.972000 audit[3152]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc44070c70 a2=0 a3=7ffc44070c5c items=0 ppid=3066 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 01:34:39.973000 audit[3155]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=3155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 01:34:39.973000 audit[3155]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb7d78500 a2=0 a3=7ffcb7d784ec items=0 ppid=3066 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 01:34:39.981000 audit[3159]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=3159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:34:39.981000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd5da75260 a2=0 a3=7ffd5da7524c items=0 ppid=3066 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:34:39.984000 audit[3159]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=3159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:34:39.984000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd5da75260 a2=0 a3=7ffd5da7524c items=0 ppid=3066 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:34:39.984000 audit[3164]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:39.984000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe9c94d0e0 a2=0 a3=7ffe9c94d0cc items=0 ppid=3066 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 13 01:34:39.986000 audit[3166]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=3166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:39.986000 audit[3166]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffefe634dd0 a2=0 a3=7ffefe634dbc items=0 ppid=3066 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:39.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 13 01:34:40.006000 audit[3169]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=3169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.006000 audit[3169]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff4063b720 a2=0 a3=7fff4063b70c items=0 ppid=3066 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 13 01:34:40.006000 audit[3170]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=3170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.006000 audit[3170]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff694e5a60 a2=0 a3=7fff694e5a4c items=0 ppid=3066 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 13 01:34:40.008000 audit[3172]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=3172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.008000 audit[3172]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb07b89e0 a2=0 a3=7ffeb07b89cc items=0 ppid=3066 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 13 01:34:40.008000 audit[3173]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.008000 audit[3173]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5a591190 a2=0 a3=7fff5a59117c items=0 ppid=3066 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 13 01:34:40.010000 audit[3175]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.010000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff313b3950 a2=0 a3=7fff313b393c items=0 ppid=3066 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 13 01:34:40.012000 audit[3178]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=3178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.012000 audit[3178]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd2fc33720 a2=0 a3=7ffd2fc3370c items=0 ppid=3066 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.012000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 13 01:34:40.012000 audit[3179]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=3179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.012000 audit[3179]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8c2cc090 a2=0 a3=7ffc8c2cc07c items=0 ppid=3066 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.012000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 13 01:34:40.014000 audit[3181]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=3181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.014000 audit[3181]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6c2aaf70 a2=0 a3=7fff6c2aaf5c items=0 ppid=3066 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 13 01:34:40.015000 audit[3182]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.015000 audit[3182]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1fdc3ca0 a2=0 a3=7ffe1fdc3c8c items=0 ppid=3066 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 13 01:34:40.016000 audit[3184]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.016000 audit[3184]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0bcee5d0 a2=0 a3=7ffc0bcee5bc items=0 ppid=3066 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 01:34:40.018000 audit[3187]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=3187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.018000 audit[3187]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4fbc1e90 a2=0 a3=7fff4fbc1e7c items=0 ppid=3066 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 13 01:34:40.021000 audit[3190]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.021000 audit[3190]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffedca287d0 a2=0 a3=7ffedca287bc items=0 ppid=3066 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 13 01:34:40.022000 audit[3191]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.022000 audit[3191]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff58b808c0 a2=0 a3=7fff58b808ac items=0 ppid=3066 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 13 01:34:40.023000 audit[3193]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.023000 audit[3193]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc5a59dc80 a2=0 a3=7ffc5a59dc6c items=0 ppid=3066 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 01:34:40.026000 audit[3196]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 01:34:40.026000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdfce0f5f0 a2=0 a3=7ffdfce0f5dc items=0 ppid=3066 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 01:34:40.030000 audit[3200]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 13 01:34:40.030000 audit[3200]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc35faa1a0 a2=0 a3=7ffc35faa18c items=0 ppid=3066 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.030000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:34:40.030000 audit[3200]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 13 01:34:40.030000 audit[3200]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc35faa1a0 a2=0 a3=7ffc35faa18c items=0 ppid=3066 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:40.030000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:34:40.045998 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1770394130.mount: Deactivated successfully. Feb 13 01:34:41.331081 env[1557]: time="2024-02-13T01:34:41.331025763Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:41.331569 env[1557]: time="2024-02-13T01:34:41.331531530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:41.332400 env[1557]: time="2024-02-13T01:34:41.332360188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:41.333340 env[1557]: time="2024-02-13T01:34:41.333282496Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:41.334272 env[1557]: time="2024-02-13T01:34:41.334256267Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 13 01:34:41.335252 env[1557]: time="2024-02-13T01:34:41.335239797Z" level=info msg="CreateContainer within sandbox \"268fc91b427479aef40dd148b46715e4e67a60f332a45558911dcdae037665aa\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 13 01:34:41.339191 env[1557]: time="2024-02-13T01:34:41.339177941Z" level=info msg="CreateContainer within sandbox \"268fc91b427479aef40dd148b46715e4e67a60f332a45558911dcdae037665aa\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"9988732aeeee9d53f5ebdadda0e29fd61e4dc4ddd985c91f5768479d2e127c55\"" Feb 13 01:34:41.339500 env[1557]: time="2024-02-13T01:34:41.339486956Z" level=info msg="StartContainer for \"9988732aeeee9d53f5ebdadda0e29fd61e4dc4ddd985c91f5768479d2e127c55\"" Feb 13 01:34:41.359257 env[1557]: time="2024-02-13T01:34:41.359231981Z" level=info msg="StartContainer for \"9988732aeeee9d53f5ebdadda0e29fd61e4dc4ddd985c91f5768479d2e127c55\" returns successfully" Feb 13 01:34:41.813835 kubelet[2758]: I0213 01:34:41.813817 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-245rs" podStartSLOduration=-9.223372033040983e+09 pod.CreationTimestamp="2024-02-13 01:34:38 +0000 UTC" firstStartedPulling="2024-02-13 01:34:38.842407921 +0000 UTC m=+13.264437905" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:34:41.813635196 +0000 UTC m=+16.235665180" watchObservedRunningTime="2024-02-13 01:34:41.813792667 +0000 UTC m=+16.235822646" Feb 13 01:34:43.025000 audit[3277]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3277 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:34:43.025000 audit[3277]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffdc179c160 a2=0 a3=7ffdc179c14c items=0 ppid=3066 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:43.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:34:43.026000 audit[3277]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3277 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:34:43.026000 audit[3277]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffdc179c160 a2=0 a3=7ffdc179c14c items=0 ppid=3066 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:43.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:34:43.131000 audit[3303]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:34:43.131000 audit[3303]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffd2fe036e0 a2=0 a3=7ffd2fe036cc items=0 ppid=3066 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:43.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:34:43.134000 audit[3303]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:34:43.134000 audit[3303]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd2fe036e0 a2=0 a3=7ffd2fe036cc items=0 ppid=3066 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:43.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:34:43.148923 kubelet[2758]: I0213 01:34:43.148882 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:43.173865 kubelet[2758]: I0213 01:34:43.173843 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:43.302748 kubelet[2758]: I0213 01:34:43.302524 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:34:43.303274 kubelet[2758]: E0213 01:34:43.303228 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:34:43.349995 kubelet[2758]: I0213 01:34:43.349932 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0e28359d-cf4e-403e-b7f5-b439a3672308-policysync\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350138 kubelet[2758]: I0213 01:34:43.350009 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fz5gz\" (UniqueName: \"kubernetes.io/projected/0e28359d-cf4e-403e-b7f5-b439a3672308-kube-api-access-fz5gz\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350138 kubelet[2758]: I0213 01:34:43.350072 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0e28359d-cf4e-403e-b7f5-b439a3672308-tigera-ca-bundle\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350254 kubelet[2758]: I0213 01:34:43.350172 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0e28359d-cf4e-403e-b7f5-b439a3672308-node-certs\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350254 kubelet[2758]: I0213 01:34:43.350209 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0e28359d-cf4e-403e-b7f5-b439a3672308-var-run-calico\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350254 kubelet[2758]: I0213 01:34:43.350234 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0e28359d-cf4e-403e-b7f5-b439a3672308-cni-bin-dir\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350371 kubelet[2758]: I0213 01:34:43.350306 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0e28359d-cf4e-403e-b7f5-b439a3672308-lib-modules\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350421 kubelet[2758]: I0213 01:34:43.350371 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0e28359d-cf4e-403e-b7f5-b439a3672308-cni-net-dir\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350467 kubelet[2758]: I0213 01:34:43.350421 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0e28359d-cf4e-403e-b7f5-b439a3672308-cni-log-dir\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350510 kubelet[2758]: I0213 01:34:43.350497 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0e28359d-cf4e-403e-b7f5-b439a3672308-flexvol-driver-host\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350622 kubelet[2758]: I0213 01:34:43.350592 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/bf151f56-bb8d-45e6-9035-022668d17fc3-typha-certs\") pod \"calico-typha-5fcd96fcb8-4llbh\" (UID: \"bf151f56-bb8d-45e6-9035-022668d17fc3\") " pod="calico-system/calico-typha-5fcd96fcb8-4llbh" Feb 13 01:34:43.350706 kubelet[2758]: I0213 01:34:43.350691 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0e28359d-cf4e-403e-b7f5-b439a3672308-xtables-lock\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350802 kubelet[2758]: I0213 01:34:43.350747 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0e28359d-cf4e-403e-b7f5-b439a3672308-var-lib-calico\") pod \"calico-node-98h2r\" (UID: \"0e28359d-cf4e-403e-b7f5-b439a3672308\") " pod="calico-system/calico-node-98h2r" Feb 13 01:34:43.350854 kubelet[2758]: I0213 01:34:43.350820 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bf151f56-bb8d-45e6-9035-022668d17fc3-tigera-ca-bundle\") pod \"calico-typha-5fcd96fcb8-4llbh\" (UID: \"bf151f56-bb8d-45e6-9035-022668d17fc3\") " pod="calico-system/calico-typha-5fcd96fcb8-4llbh" Feb 13 01:34:43.350912 kubelet[2758]: I0213 01:34:43.350896 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xltr9\" (UniqueName: \"kubernetes.io/projected/bf151f56-bb8d-45e6-9035-022668d17fc3-kube-api-access-xltr9\") pod \"calico-typha-5fcd96fcb8-4llbh\" (UID: \"bf151f56-bb8d-45e6-9035-022668d17fc3\") " pod="calico-system/calico-typha-5fcd96fcb8-4llbh" Feb 13 01:34:43.451427 kubelet[2758]: I0213 01:34:43.451385 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mx8j2\" (UniqueName: \"kubernetes.io/projected/a2afb53c-b33f-498f-9383-018830c7932b-kube-api-access-mx8j2\") pod \"csi-node-driver-6fhg4\" (UID: \"a2afb53c-b33f-498f-9383-018830c7932b\") " pod="calico-system/csi-node-driver-6fhg4" Feb 13 01:34:43.451579 kubelet[2758]: I0213 01:34:43.451571 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a2afb53c-b33f-498f-9383-018830c7932b-varrun\") pod \"csi-node-driver-6fhg4\" (UID: \"a2afb53c-b33f-498f-9383-018830c7932b\") " pod="calico-system/csi-node-driver-6fhg4" Feb 13 01:34:43.451678 kubelet[2758]: I0213 01:34:43.451609 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a2afb53c-b33f-498f-9383-018830c7932b-kubelet-dir\") pod \"csi-node-driver-6fhg4\" (UID: \"a2afb53c-b33f-498f-9383-018830c7932b\") " pod="calico-system/csi-node-driver-6fhg4" Feb 13 01:34:43.451740 kubelet[2758]: I0213 01:34:43.451696 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a2afb53c-b33f-498f-9383-018830c7932b-socket-dir\") pod \"csi-node-driver-6fhg4\" (UID: \"a2afb53c-b33f-498f-9383-018830c7932b\") " pod="calico-system/csi-node-driver-6fhg4" Feb 13 01:34:43.451837 kubelet[2758]: I0213 01:34:43.451809 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a2afb53c-b33f-498f-9383-018830c7932b-registration-dir\") pod \"csi-node-driver-6fhg4\" (UID: \"a2afb53c-b33f-498f-9383-018830c7932b\") " pod="calico-system/csi-node-driver-6fhg4" Feb 13 01:34:43.452716 kubelet[2758]: E0213 01:34:43.452692 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.452716 kubelet[2758]: W0213 01:34:43.452711 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.452893 kubelet[2758]: E0213 01:34:43.452735 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.452994 kubelet[2758]: E0213 01:34:43.452974 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.452994 kubelet[2758]: W0213 01:34:43.452993 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.453186 kubelet[2758]: E0213 01:34:43.453016 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.455599 kubelet[2758]: E0213 01:34:43.455577 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.455599 kubelet[2758]: W0213 01:34:43.455595 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.455769 kubelet[2758]: E0213 01:34:43.455639 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.455964 kubelet[2758]: E0213 01:34:43.455933 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.455964 kubelet[2758]: W0213 01:34:43.455951 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.455964 kubelet[2758]: E0213 01:34:43.455971 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.552306 kubelet[2758]: E0213 01:34:43.552245 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.552306 kubelet[2758]: W0213 01:34:43.552267 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.552306 kubelet[2758]: E0213 01:34:43.552293 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.552583 kubelet[2758]: E0213 01:34:43.552569 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.552583 kubelet[2758]: W0213 01:34:43.552582 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.552724 kubelet[2758]: E0213 01:34:43.552602 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.552984 kubelet[2758]: E0213 01:34:43.552880 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.552984 kubelet[2758]: W0213 01:34:43.552905 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.552984 kubelet[2758]: E0213 01:34:43.552936 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.553274 kubelet[2758]: E0213 01:34:43.553223 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.553274 kubelet[2758]: W0213 01:34:43.553245 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.553432 kubelet[2758]: E0213 01:34:43.553280 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.553610 kubelet[2758]: E0213 01:34:43.553593 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.553675 kubelet[2758]: W0213 01:34:43.553610 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.553675 kubelet[2758]: E0213 01:34:43.553660 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.554032 kubelet[2758]: E0213 01:34:43.554010 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.554032 kubelet[2758]: W0213 01:34:43.554029 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.554195 kubelet[2758]: E0213 01:34:43.554117 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.554322 kubelet[2758]: E0213 01:34:43.554296 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.554322 kubelet[2758]: W0213 01:34:43.554311 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.554427 kubelet[2758]: E0213 01:34:43.554353 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.554539 kubelet[2758]: E0213 01:34:43.554525 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.554596 kubelet[2758]: W0213 01:34:43.554538 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.554596 kubelet[2758]: E0213 01:34:43.554560 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.554894 kubelet[2758]: E0213 01:34:43.554844 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.554894 kubelet[2758]: W0213 01:34:43.554864 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.554894 kubelet[2758]: E0213 01:34:43.554897 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.555194 kubelet[2758]: E0213 01:34:43.555145 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.555194 kubelet[2758]: W0213 01:34:43.555162 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.555194 kubelet[2758]: E0213 01:34:43.555190 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.555468 kubelet[2758]: E0213 01:34:43.555453 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.555533 kubelet[2758]: W0213 01:34:43.555471 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.555533 kubelet[2758]: E0213 01:34:43.555497 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.555741 kubelet[2758]: E0213 01:34:43.555726 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.555799 kubelet[2758]: W0213 01:34:43.555743 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.555799 kubelet[2758]: E0213 01:34:43.555767 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.556021 kubelet[2758]: E0213 01:34:43.556006 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.556076 kubelet[2758]: W0213 01:34:43.556023 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.556076 kubelet[2758]: E0213 01:34:43.556049 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.556361 kubelet[2758]: E0213 01:34:43.556325 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.556361 kubelet[2758]: W0213 01:34:43.556340 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.556467 kubelet[2758]: E0213 01:34:43.556365 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.556662 kubelet[2758]: E0213 01:34:43.556646 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.556725 kubelet[2758]: W0213 01:34:43.556663 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.556725 kubelet[2758]: E0213 01:34:43.556691 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.556983 kubelet[2758]: E0213 01:34:43.556966 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.557050 kubelet[2758]: W0213 01:34:43.556986 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.557050 kubelet[2758]: E0213 01:34:43.557010 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.557259 kubelet[2758]: E0213 01:34:43.557241 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.557259 kubelet[2758]: W0213 01:34:43.557256 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.557378 kubelet[2758]: E0213 01:34:43.557280 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.557487 kubelet[2758]: E0213 01:34:43.557474 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.557549 kubelet[2758]: W0213 01:34:43.557487 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.557549 kubelet[2758]: E0213 01:34:43.557511 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.557818 kubelet[2758]: E0213 01:34:43.557799 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.557818 kubelet[2758]: W0213 01:34:43.557816 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.557929 kubelet[2758]: E0213 01:34:43.557839 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.558072 kubelet[2758]: E0213 01:34:43.558057 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.558072 kubelet[2758]: W0213 01:34:43.558071 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.558174 kubelet[2758]: E0213 01:34:43.558110 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.558309 kubelet[2758]: E0213 01:34:43.558294 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.558370 kubelet[2758]: W0213 01:34:43.558308 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.558425 kubelet[2758]: E0213 01:34:43.558372 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.558537 kubelet[2758]: E0213 01:34:43.558524 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.558591 kubelet[2758]: W0213 01:34:43.558537 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.558591 kubelet[2758]: E0213 01:34:43.558556 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.558795 kubelet[2758]: E0213 01:34:43.558783 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.558795 kubelet[2758]: W0213 01:34:43.558795 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.558897 kubelet[2758]: E0213 01:34:43.558816 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.559096 kubelet[2758]: E0213 01:34:43.559083 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.559155 kubelet[2758]: W0213 01:34:43.559097 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.559155 kubelet[2758]: E0213 01:34:43.559119 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.559364 kubelet[2758]: E0213 01:34:43.559351 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.559364 kubelet[2758]: W0213 01:34:43.559363 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.559478 kubelet[2758]: E0213 01:34:43.559378 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.559566 kubelet[2758]: E0213 01:34:43.559553 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.559566 kubelet[2758]: W0213 01:34:43.559565 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.559688 kubelet[2758]: E0213 01:34:43.559582 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.559915 kubelet[2758]: E0213 01:34:43.559897 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.559984 kubelet[2758]: W0213 01:34:43.559915 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.559984 kubelet[2758]: E0213 01:34:43.559940 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.563583 kubelet[2758]: E0213 01:34:43.563557 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.563583 kubelet[2758]: W0213 01:34:43.563578 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.563799 kubelet[2758]: E0213 01:34:43.563611 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.657829 kubelet[2758]: E0213 01:34:43.657793 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.658072 kubelet[2758]: W0213 01:34:43.658040 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.658248 kubelet[2758]: E0213 01:34:43.658222 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.658719 kubelet[2758]: E0213 01:34:43.658672 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.658719 kubelet[2758]: W0213 01:34:43.658686 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.658719 kubelet[2758]: E0213 01:34:43.658701 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.754283 env[1557]: time="2024-02-13T01:34:43.754142884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5fcd96fcb8-4llbh,Uid:bf151f56-bb8d-45e6-9035-022668d17fc3,Namespace:calico-system,Attempt:0,}" Feb 13 01:34:43.760020 kubelet[2758]: E0213 01:34:43.759970 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.760020 kubelet[2758]: W0213 01:34:43.760011 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.760404 kubelet[2758]: E0213 01:34:43.760056 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.760628 kubelet[2758]: E0213 01:34:43.760575 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.760782 kubelet[2758]: W0213 01:34:43.760632 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.760782 kubelet[2758]: E0213 01:34:43.760682 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.771765 kubelet[2758]: E0213 01:34:43.771718 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.771765 kubelet[2758]: W0213 01:34:43.771755 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.772093 kubelet[2758]: E0213 01:34:43.771812 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.776256 env[1557]: time="2024-02-13T01:34:43.776140308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-98h2r,Uid:0e28359d-cf4e-403e-b7f5-b439a3672308,Namespace:calico-system,Attempt:0,}" Feb 13 01:34:43.778198 env[1557]: time="2024-02-13T01:34:43.778052709Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:34:43.778198 env[1557]: time="2024-02-13T01:34:43.778137085Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:34:43.778198 env[1557]: time="2024-02-13T01:34:43.778171271Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:34:43.778677 env[1557]: time="2024-02-13T01:34:43.778516605Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef7724f757196aa811a20b7434311e6ae6db6f3386d4b2477526fc86d2454ffb pid=3352 runtime=io.containerd.runc.v2 Feb 13 01:34:43.796738 env[1557]: time="2024-02-13T01:34:43.796607846Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:34:43.796738 env[1557]: time="2024-02-13T01:34:43.796710604Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:34:43.797068 env[1557]: time="2024-02-13T01:34:43.796738612Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:34:43.797068 env[1557]: time="2024-02-13T01:34:43.796976640Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30b9326b277d029badc15ddb6a139a448e9235ebcfb11dffc473d77ad5adad94 pid=3376 runtime=io.containerd.runc.v2 Feb 13 01:34:43.829407 env[1557]: time="2024-02-13T01:34:43.829324288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-98h2r,Uid:0e28359d-cf4e-403e-b7f5-b439a3672308,Namespace:calico-system,Attempt:0,} returns sandbox id \"30b9326b277d029badc15ddb6a139a448e9235ebcfb11dffc473d77ad5adad94\"" Feb 13 01:34:43.830251 env[1557]: time="2024-02-13T01:34:43.830229952Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 13 01:34:43.838918 env[1557]: time="2024-02-13T01:34:43.838883558Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5fcd96fcb8-4llbh,Uid:bf151f56-bb8d-45e6-9035-022668d17fc3,Namespace:calico-system,Attempt:0,} returns sandbox id \"ef7724f757196aa811a20b7434311e6ae6db6f3386d4b2477526fc86d2454ffb\"" Feb 13 01:34:43.861926 kubelet[2758]: E0213 01:34:43.861880 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.861926 kubelet[2758]: W0213 01:34:43.861891 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.861926 kubelet[2758]: E0213 01:34:43.861905 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:43.960109 kubelet[2758]: E0213 01:34:43.960087 2758 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 01:34:43.960109 kubelet[2758]: W0213 01:34:43.960102 2758 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 01:34:43.960265 kubelet[2758]: E0213 01:34:43.960122 2758 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 01:34:44.232000 audit[3453]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:34:44.232000 audit[3453]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffd87864230 a2=0 a3=7ffd8786421c items=0 ppid=3066 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:44.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:34:44.234000 audit[3453]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:34:44.234000 audit[3453]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd87864230 a2=0 a3=7ffd8786421c items=0 ppid=3066 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:34:44.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:34:44.759826 kubelet[2758]: E0213 01:34:44.759790 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:34:46.760858 kubelet[2758]: E0213 01:34:46.760807 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:34:48.760826 kubelet[2758]: E0213 01:34:48.760759 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:34:50.760929 kubelet[2758]: E0213 01:34:50.760820 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:34:51.338823 env[1557]: time="2024-02-13T01:34:51.338772633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:51.339414 env[1557]: time="2024-02-13T01:34:51.339368841Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:51.340524 env[1557]: time="2024-02-13T01:34:51.340485337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:51.341618 env[1557]: time="2024-02-13T01:34:51.341575267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:34:51.342130 env[1557]: time="2024-02-13T01:34:51.342080536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 13 01:34:51.342460 env[1557]: time="2024-02-13T01:34:51.342434077Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 13 01:34:51.343521 env[1557]: time="2024-02-13T01:34:51.343507784Z" level=info msg="CreateContainer within sandbox \"30b9326b277d029badc15ddb6a139a448e9235ebcfb11dffc473d77ad5adad94\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 13 01:34:51.348666 env[1557]: time="2024-02-13T01:34:51.348624804Z" level=info msg="CreateContainer within sandbox \"30b9326b277d029badc15ddb6a139a448e9235ebcfb11dffc473d77ad5adad94\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"be3636f9d6b8aabddc6c140b4eb70b1e2417bce16a58ccdc4efc77c7137d1582\"" Feb 13 01:34:51.349036 env[1557]: time="2024-02-13T01:34:51.348978503Z" level=info msg="StartContainer for \"be3636f9d6b8aabddc6c140b4eb70b1e2417bce16a58ccdc4efc77c7137d1582\"" Feb 13 01:34:51.383305 env[1557]: time="2024-02-13T01:34:51.383185650Z" level=info msg="StartContainer for \"be3636f9d6b8aabddc6c140b4eb70b1e2417bce16a58ccdc4efc77c7137d1582\" returns successfully" Feb 13 01:34:51.392109 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-be3636f9d6b8aabddc6c140b4eb70b1e2417bce16a58ccdc4efc77c7137d1582-rootfs.mount: Deactivated successfully. Feb 13 01:34:51.634126 env[1557]: time="2024-02-13T01:34:51.633898648Z" level=info msg="shim disconnected" id=be3636f9d6b8aabddc6c140b4eb70b1e2417bce16a58ccdc4efc77c7137d1582 Feb 13 01:34:51.634126 env[1557]: time="2024-02-13T01:34:51.634012153Z" level=warning msg="cleaning up after shim disconnected" id=be3636f9d6b8aabddc6c140b4eb70b1e2417bce16a58ccdc4efc77c7137d1582 namespace=k8s.io Feb 13 01:34:51.634126 env[1557]: time="2024-02-13T01:34:51.634044257Z" level=info msg="cleaning up dead shim" Feb 13 01:34:51.650168 env[1557]: time="2024-02-13T01:34:51.650047299Z" level=warning msg="cleanup warnings time=\"2024-02-13T01:34:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3500 runtime=io.containerd.runc.v2\n" Feb 13 01:34:52.761150 kubelet[2758]: E0213 01:34:52.761076 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:34:54.760610 kubelet[2758]: E0213 01:34:54.760488 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:34:55.048552 systemd[1]: Started sshd@9-147.75.90.7:22-154.8.204.139:48514.service. Feb 13 01:34:55.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.90.7:22-154.8.204.139:48514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:55.075279 kernel: kauditd_printk_skb: 140 callbacks suppressed Feb 13 01:34:55.075320 kernel: audit: type=1130 audit(1707788095.047:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.90.7:22-154.8.204.139:48514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:55.354973 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount671041526.mount: Deactivated successfully. Feb 13 01:34:56.760141 kubelet[2758]: E0213 01:34:56.760044 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:34:58.760093 kubelet[2758]: E0213 01:34:58.759988 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:00.760707 kubelet[2758]: E0213 01:35:00.760638 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:02.760741 kubelet[2758]: E0213 01:35:02.760645 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:04.760780 kubelet[2758]: E0213 01:35:04.760719 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:05.607801 systemd[1]: Started sshd@10-147.75.90.7:22-104.250.49.155:56320.service. Feb 13 01:35:05.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.90.7:22-104.250.49.155:56320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:05.698619 kernel: audit: type=1130 audit(1707788105.607:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.90.7:22-104.250.49.155:56320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:06.481965 sshd[3523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.155 user=root Feb 13 01:35:06.481000 audit[3523]: USER_AUTH pid=3523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 01:35:06.573644 kernel: audit: type=1100 audit(1707788106.481:283): pid=3523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 01:35:06.760833 kubelet[2758]: E0213 01:35:06.760640 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:08.450899 sshd[3523]: Failed password for root from 104.250.49.155 port 56320 ssh2 Feb 13 01:35:08.760541 kubelet[2758]: E0213 01:35:08.760468 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:08.972370 env[1557]: time="2024-02-13T01:35:08.972319174Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:08.972914 env[1557]: time="2024-02-13T01:35:08.972875122Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:08.973955 env[1557]: time="2024-02-13T01:35:08.973941620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:08.975711 env[1557]: time="2024-02-13T01:35:08.975695379Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:08.976355 env[1557]: time="2024-02-13T01:35:08.976337200Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 13 01:35:08.976729 env[1557]: time="2024-02-13T01:35:08.976712831Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 13 01:35:08.979963 env[1557]: time="2024-02-13T01:35:08.979939490Z" level=info msg="CreateContainer within sandbox \"ef7724f757196aa811a20b7434311e6ae6db6f3386d4b2477526fc86d2454ffb\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 13 01:35:08.986863 env[1557]: time="2024-02-13T01:35:08.986825348Z" level=info msg="CreateContainer within sandbox \"ef7724f757196aa811a20b7434311e6ae6db6f3386d4b2477526fc86d2454ffb\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e9a2baac5aef65e6a26fad8be131882bcc70f72fbca56bfacf83760da9c1d50f\"" Feb 13 01:35:08.987419 env[1557]: time="2024-02-13T01:35:08.987401696Z" level=info msg="StartContainer for \"e9a2baac5aef65e6a26fad8be131882bcc70f72fbca56bfacf83760da9c1d50f\"" Feb 13 01:35:09.022580 env[1557]: time="2024-02-13T01:35:09.022519919Z" level=info msg="StartContainer for \"e9a2baac5aef65e6a26fad8be131882bcc70f72fbca56bfacf83760da9c1d50f\" returns successfully" Feb 13 01:35:09.897762 kubelet[2758]: I0213 01:35:09.897693 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5fcd96fcb8-4llbh" podStartSLOduration=-9.223372009957195e+09 pod.CreationTimestamp="2024-02-13 01:34:43 +0000 UTC" firstStartedPulling="2024-02-13 01:34:43.839473328 +0000 UTC m=+18.261503311" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:35:09.89681434 +0000 UTC m=+44.318844423" watchObservedRunningTime="2024-02-13 01:35:09.897581163 +0000 UTC m=+44.319611194" Feb 13 01:35:09.920513 sshd[3523]: Received disconnect from 104.250.49.155 port 56320:11: Bye Bye [preauth] Feb 13 01:35:09.921714 sshd[3523]: Disconnected from authenticating user root 104.250.49.155 port 56320 [preauth] Feb 13 01:35:09.922661 systemd[1]: sshd@10-147.75.90.7:22-104.250.49.155:56320.service: Deactivated successfully. Feb 13 01:35:09.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.90.7:22-104.250.49.155:56320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:10.013621 kernel: audit: type=1131 audit(1707788109.921:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.90.7:22-104.250.49.155:56320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:10.028000 audit[3607]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:10.028000 audit[3607]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd1bcc4720 a2=0 a3=7ffd1bcc470c items=0 ppid=3066 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:10.187852 kernel: audit: type=1325 audit(1707788110.028:285): table=filter:109 family=2 entries=13 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:10.187891 kernel: audit: type=1300 audit(1707788110.028:285): arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd1bcc4720 a2=0 a3=7ffd1bcc470c items=0 ppid=3066 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:10.187909 kernel: audit: type=1327 audit(1707788110.028:285): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:10.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:10.028000 audit[3607]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:10.028000 audit[3607]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd1bcc4720 a2=0 a3=7ffd1bcc470c items=0 ppid=3066 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:10.404692 kernel: audit: type=1325 audit(1707788110.028:286): table=nat:110 family=2 entries=27 op=nft_register_chain pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:10.404722 kernel: audit: type=1300 audit(1707788110.028:286): arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd1bcc4720 a2=0 a3=7ffd1bcc470c items=0 ppid=3066 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:10.404739 kernel: audit: type=1327 audit(1707788110.028:286): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:10.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:10.760332 kubelet[2758]: E0213 01:35:10.760225 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:12.388192 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3325465787.mount: Deactivated successfully. Feb 13 01:35:12.760223 kubelet[2758]: E0213 01:35:12.760124 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:14.760467 kubelet[2758]: E0213 01:35:14.760405 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:16.760837 kubelet[2758]: E0213 01:35:16.760779 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:18.760377 kubelet[2758]: E0213 01:35:18.760260 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:18.978568 systemd[1]: Started sshd@11-147.75.90.7:22-101.42.234.252:60026.service. Feb 13 01:35:18.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.90.7:22-101.42.234.252:60026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:19.071697 kernel: audit: type=1130 audit(1707788118.977:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.90.7:22-101.42.234.252:60026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:19.832162 sshd[3608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.234.252 user=root Feb 13 01:35:19.830000 audit[3608]: USER_AUTH pid=3608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.234.252 addr=101.42.234.252 terminal=ssh res=failed' Feb 13 01:35:19.924664 kernel: audit: type=1100 audit(1707788119.830:288): pid=3608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.234.252 addr=101.42.234.252 terminal=ssh res=failed' Feb 13 01:35:20.760195 kubelet[2758]: E0213 01:35:20.760076 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:22.252804 sshd[3608]: Failed password for root from 101.42.234.252 port 60026 ssh2 Feb 13 01:35:22.760470 kubelet[2758]: E0213 01:35:22.760417 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:23.265970 sshd[3608]: Received disconnect from 101.42.234.252 port 60026:11: Bye Bye [preauth] Feb 13 01:35:23.265970 sshd[3608]: Disconnected from authenticating user root 101.42.234.252 port 60026 [preauth] Feb 13 01:35:23.268392 systemd[1]: sshd@11-147.75.90.7:22-101.42.234.252:60026.service: Deactivated successfully. Feb 13 01:35:23.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.90.7:22-101.42.234.252:60026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:23.361687 kernel: audit: type=1131 audit(1707788123.268:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.90.7:22-101.42.234.252:60026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:24.760700 kubelet[2758]: E0213 01:35:24.760647 2758 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:25.031337 env[1557]: time="2024-02-13T01:35:25.031257852Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:25.031845 env[1557]: time="2024-02-13T01:35:25.031802242Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:25.033082 env[1557]: time="2024-02-13T01:35:25.033037467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:25.033849 env[1557]: time="2024-02-13T01:35:25.033808823Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:25.034240 env[1557]: time="2024-02-13T01:35:25.034194465Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 13 01:35:25.035529 env[1557]: time="2024-02-13T01:35:25.035486571Z" level=info msg="CreateContainer within sandbox \"30b9326b277d029badc15ddb6a139a448e9235ebcfb11dffc473d77ad5adad94\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 13 01:35:25.039840 env[1557]: time="2024-02-13T01:35:25.039796310Z" level=info msg="CreateContainer within sandbox \"30b9326b277d029badc15ddb6a139a448e9235ebcfb11dffc473d77ad5adad94\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6ec926b92c5144ad0d4919a6e11520f9e4219fceeb87bc5ca79e43b45dc85b07\"" Feb 13 01:35:25.040176 env[1557]: time="2024-02-13T01:35:25.040116505Z" level=info msg="StartContainer for \"6ec926b92c5144ad0d4919a6e11520f9e4219fceeb87bc5ca79e43b45dc85b07\"" Feb 13 01:35:25.086182 env[1557]: time="2024-02-13T01:35:25.086104083Z" level=info msg="StartContainer for \"6ec926b92c5144ad0d4919a6e11520f9e4219fceeb87bc5ca79e43b45dc85b07\" returns successfully" Feb 13 01:35:25.755500 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6ec926b92c5144ad0d4919a6e11520f9e4219fceeb87bc5ca79e43b45dc85b07-rootfs.mount: Deactivated successfully. Feb 13 01:35:25.813162 kubelet[2758]: I0213 01:35:25.813118 2758 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 13 01:35:25.849317 kubelet[2758]: I0213 01:35:25.849257 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:35:25.850164 kubelet[2758]: I0213 01:35:25.850072 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:35:25.850945 kubelet[2758]: I0213 01:35:25.850867 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:35:25.908856 env[1557]: time="2024-02-13T01:35:25.908671415Z" level=error msg="collecting metrics for 6ec926b92c5144ad0d4919a6e11520f9e4219fceeb87bc5ca79e43b45dc85b07" error="cgroups: cgroup deleted: unknown" Feb 13 01:35:25.952137 kubelet[2758]: I0213 01:35:25.952048 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rkd8n\" (UniqueName: \"kubernetes.io/projected/6a66657b-7973-4ebf-a8cb-c6cb52a5c528-kube-api-access-rkd8n\") pod \"coredns-787d4945fb-8bcp4\" (UID: \"6a66657b-7973-4ebf-a8cb-c6cb52a5c528\") " pod="kube-system/coredns-787d4945fb-8bcp4" Feb 13 01:35:25.952511 kubelet[2758]: I0213 01:35:25.952152 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6a66657b-7973-4ebf-a8cb-c6cb52a5c528-config-volume\") pod \"coredns-787d4945fb-8bcp4\" (UID: \"6a66657b-7973-4ebf-a8cb-c6cb52a5c528\") " pod="kube-system/coredns-787d4945fb-8bcp4" Feb 13 01:35:25.952511 kubelet[2758]: I0213 01:35:25.952307 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tgkmb\" (UniqueName: \"kubernetes.io/projected/01f5d4d2-83e3-48c7-87ce-959645d54c3e-kube-api-access-tgkmb\") pod \"calico-kube-controllers-85c58d5987-cq5bq\" (UID: \"01f5d4d2-83e3-48c7-87ce-959645d54c3e\") " pod="calico-system/calico-kube-controllers-85c58d5987-cq5bq" Feb 13 01:35:25.952511 kubelet[2758]: I0213 01:35:25.952410 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m94x8\" (UniqueName: \"kubernetes.io/projected/2cc0688b-bce9-43e9-8359-74570cd615a9-kube-api-access-m94x8\") pod \"coredns-787d4945fb-vkv8f\" (UID: \"2cc0688b-bce9-43e9-8359-74570cd615a9\") " pod="kube-system/coredns-787d4945fb-vkv8f" Feb 13 01:35:25.952890 kubelet[2758]: I0213 01:35:25.952647 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2cc0688b-bce9-43e9-8359-74570cd615a9-config-volume\") pod \"coredns-787d4945fb-vkv8f\" (UID: \"2cc0688b-bce9-43e9-8359-74570cd615a9\") " pod="kube-system/coredns-787d4945fb-vkv8f" Feb 13 01:35:25.953004 kubelet[2758]: I0213 01:35:25.952982 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/01f5d4d2-83e3-48c7-87ce-959645d54c3e-tigera-ca-bundle\") pod \"calico-kube-controllers-85c58d5987-cq5bq\" (UID: \"01f5d4d2-83e3-48c7-87ce-959645d54c3e\") " pod="calico-system/calico-kube-controllers-85c58d5987-cq5bq" Feb 13 01:35:26.161116 env[1557]: time="2024-02-13T01:35:26.160888750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-8bcp4,Uid:6a66657b-7973-4ebf-a8cb-c6cb52a5c528,Namespace:kube-system,Attempt:0,}" Feb 13 01:35:26.162504 env[1557]: time="2024-02-13T01:35:26.161768131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85c58d5987-cq5bq,Uid:01f5d4d2-83e3-48c7-87ce-959645d54c3e,Namespace:calico-system,Attempt:0,}" Feb 13 01:35:26.403387 env[1557]: time="2024-02-13T01:35:26.403237165Z" level=info msg="shim disconnected" id=6ec926b92c5144ad0d4919a6e11520f9e4219fceeb87bc5ca79e43b45dc85b07 Feb 13 01:35:26.403387 env[1557]: time="2024-02-13T01:35:26.403349892Z" level=warning msg="cleaning up after shim disconnected" id=6ec926b92c5144ad0d4919a6e11520f9e4219fceeb87bc5ca79e43b45dc85b07 namespace=k8s.io Feb 13 01:35:26.403387 env[1557]: time="2024-02-13T01:35:26.403393400Z" level=info msg="cleaning up dead shim" Feb 13 01:35:26.421591 env[1557]: time="2024-02-13T01:35:26.421328791Z" level=warning msg="cleanup warnings time=\"2024-02-13T01:35:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3686 runtime=io.containerd.runc.v2\n" Feb 13 01:35:26.457734 env[1557]: time="2024-02-13T01:35:26.457702884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-vkv8f,Uid:2cc0688b-bce9-43e9-8359-74570cd615a9,Namespace:kube-system,Attempt:0,}" Feb 13 01:35:26.464188 env[1557]: time="2024-02-13T01:35:26.464125959Z" level=error msg="Failed to destroy network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.464473 env[1557]: time="2024-02-13T01:35:26.464432428Z" level=error msg="Failed to destroy network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.464759 env[1557]: time="2024-02-13T01:35:26.464706945Z" level=error msg="encountered an error cleaning up failed sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.464759 env[1557]: time="2024-02-13T01:35:26.464745519Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-8bcp4,Uid:6a66657b-7973-4ebf-a8cb-c6cb52a5c528,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.464860 env[1557]: time="2024-02-13T01:35:26.464784343Z" level=error msg="encountered an error cleaning up failed sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.464860 env[1557]: time="2024-02-13T01:35:26.464826971Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85c58d5987-cq5bq,Uid:01f5d4d2-83e3-48c7-87ce-959645d54c3e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.464960 kubelet[2758]: E0213 01:35:26.464930 2758 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.465021 kubelet[2758]: E0213 01:35:26.464995 2758 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-8bcp4" Feb 13 01:35:26.465021 kubelet[2758]: E0213 01:35:26.464930 2758 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.465087 kubelet[2758]: E0213 01:35:26.465033 2758 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-8bcp4" Feb 13 01:35:26.465087 kubelet[2758]: E0213 01:35:26.465067 2758 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85c58d5987-cq5bq" Feb 13 01:35:26.465156 kubelet[2758]: E0213 01:35:26.465102 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-8bcp4_kube-system(6a66657b-7973-4ebf-a8cb-c6cb52a5c528)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-8bcp4_kube-system(6a66657b-7973-4ebf-a8cb-c6cb52a5c528)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-8bcp4" podUID=6a66657b-7973-4ebf-a8cb-c6cb52a5c528 Feb 13 01:35:26.465156 kubelet[2758]: E0213 01:35:26.465103 2758 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85c58d5987-cq5bq" Feb 13 01:35:26.465156 kubelet[2758]: E0213 01:35:26.465155 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-85c58d5987-cq5bq_calico-system(01f5d4d2-83e3-48c7-87ce-959645d54c3e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-85c58d5987-cq5bq_calico-system(01f5d4d2-83e3-48c7-87ce-959645d54c3e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85c58d5987-cq5bq" podUID=01f5d4d2-83e3-48c7-87ce-959645d54c3e Feb 13 01:35:26.497197 env[1557]: time="2024-02-13T01:35:26.497123682Z" level=error msg="Failed to destroy network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.497470 env[1557]: time="2024-02-13T01:35:26.497396444Z" level=error msg="encountered an error cleaning up failed sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.497533 env[1557]: time="2024-02-13T01:35:26.497461596Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-vkv8f,Uid:2cc0688b-bce9-43e9-8359-74570cd615a9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.497727 kubelet[2758]: E0213 01:35:26.497677 2758 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.497727 kubelet[2758]: E0213 01:35:26.497724 2758 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-vkv8f" Feb 13 01:35:26.497834 kubelet[2758]: E0213 01:35:26.497745 2758 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-vkv8f" Feb 13 01:35:26.497834 kubelet[2758]: E0213 01:35:26.497790 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-vkv8f_kube-system(2cc0688b-bce9-43e9-8359-74570cd615a9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-vkv8f_kube-system(2cc0688b-bce9-43e9-8359-74570cd615a9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-vkv8f" podUID=2cc0688b-bce9-43e9-8359-74570cd615a9 Feb 13 01:35:26.765616 env[1557]: time="2024-02-13T01:35:26.765566115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6fhg4,Uid:a2afb53c-b33f-498f-9383-018830c7932b,Namespace:calico-system,Attempt:0,}" Feb 13 01:35:26.793248 env[1557]: time="2024-02-13T01:35:26.793210342Z" level=error msg="Failed to destroy network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.793449 env[1557]: time="2024-02-13T01:35:26.793430784Z" level=error msg="encountered an error cleaning up failed sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.793492 env[1557]: time="2024-02-13T01:35:26.793465620Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6fhg4,Uid:a2afb53c-b33f-498f-9383-018830c7932b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.793675 kubelet[2758]: E0213 01:35:26.793621 2758 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.793675 kubelet[2758]: E0213 01:35:26.793664 2758 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6fhg4" Feb 13 01:35:26.793764 kubelet[2758]: E0213 01:35:26.793684 2758 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6fhg4" Feb 13 01:35:26.793764 kubelet[2758]: E0213 01:35:26.793721 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6fhg4_calico-system(a2afb53c-b33f-498f-9383-018830c7932b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6fhg4_calico-system(a2afb53c-b33f-498f-9383-018830c7932b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:26.937319 kubelet[2758]: I0213 01:35:26.937254 2758 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:35:26.938552 env[1557]: time="2024-02-13T01:35:26.938468783Z" level=info msg="StopPodSandbox for \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\"" Feb 13 01:35:26.943521 env[1557]: time="2024-02-13T01:35:26.943430310Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 13 01:35:26.943845 kubelet[2758]: I0213 01:35:26.943471 2758 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:35:26.944781 env[1557]: time="2024-02-13T01:35:26.944675927Z" level=info msg="StopPodSandbox for \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\"" Feb 13 01:35:26.946027 kubelet[2758]: I0213 01:35:26.945974 2758 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:35:26.947318 env[1557]: time="2024-02-13T01:35:26.947227751Z" level=info msg="StopPodSandbox for \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\"" Feb 13 01:35:26.948554 kubelet[2758]: I0213 01:35:26.948493 2758 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:35:26.949792 env[1557]: time="2024-02-13T01:35:26.949711978Z" level=info msg="StopPodSandbox for \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\"" Feb 13 01:35:26.988850 env[1557]: time="2024-02-13T01:35:26.988758045Z" level=error msg="StopPodSandbox for \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\" failed" error="failed to destroy network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.989052 kubelet[2758]: E0213 01:35:26.989028 2758 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:35:26.989172 kubelet[2758]: E0213 01:35:26.989094 2758 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee} Feb 13 01:35:26.989172 kubelet[2758]: E0213 01:35:26.989156 2758 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a2afb53c-b33f-498f-9383-018830c7932b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 01:35:26.989317 kubelet[2758]: E0213 01:35:26.989202 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a2afb53c-b33f-498f-9383-018830c7932b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:26.989716 env[1557]: time="2024-02-13T01:35:26.989670928Z" level=error msg="StopPodSandbox for \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\" failed" error="failed to destroy network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.989838 kubelet[2758]: E0213 01:35:26.989823 2758 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:35:26.989908 kubelet[2758]: E0213 01:35:26.989851 2758 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76} Feb 13 01:35:26.989908 kubelet[2758]: E0213 01:35:26.989884 2758 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2cc0688b-bce9-43e9-8359-74570cd615a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 01:35:26.990013 kubelet[2758]: E0213 01:35:26.989910 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2cc0688b-bce9-43e9-8359-74570cd615a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-vkv8f" podUID=2cc0688b-bce9-43e9-8359-74570cd615a9 Feb 13 01:35:26.990319 env[1557]: time="2024-02-13T01:35:26.990275230Z" level=error msg="StopPodSandbox for \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\" failed" error="failed to destroy network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.990441 kubelet[2758]: E0213 01:35:26.990427 2758 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:35:26.990521 kubelet[2758]: E0213 01:35:26.990456 2758 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89} Feb 13 01:35:26.990521 kubelet[2758]: E0213 01:35:26.990513 2758 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"01f5d4d2-83e3-48c7-87ce-959645d54c3e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 01:35:26.990663 kubelet[2758]: E0213 01:35:26.990557 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"01f5d4d2-83e3-48c7-87ce-959645d54c3e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85c58d5987-cq5bq" podUID=01f5d4d2-83e3-48c7-87ce-959645d54c3e Feb 13 01:35:26.991869 env[1557]: time="2024-02-13T01:35:26.991837958Z" level=error msg="StopPodSandbox for \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\" failed" error="failed to destroy network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:26.991969 kubelet[2758]: E0213 01:35:26.991956 2758 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:35:26.992039 kubelet[2758]: E0213 01:35:26.991980 2758 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2} Feb 13 01:35:26.992039 kubelet[2758]: E0213 01:35:26.992024 2758 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6a66657b-7973-4ebf-a8cb-c6cb52a5c528\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 01:35:26.992156 kubelet[2758]: E0213 01:35:26.992064 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6a66657b-7973-4ebf-a8cb-c6cb52a5c528\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-8bcp4" podUID=6a66657b-7973-4ebf-a8cb-c6cb52a5c528 Feb 13 01:35:27.081307 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89-shm.mount: Deactivated successfully. Feb 13 01:35:27.081625 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2-shm.mount: Deactivated successfully. Feb 13 01:35:36.352494 systemd[1]: Started sshd@12-147.75.90.7:22-43.139.1.143:57164.service. Feb 13 01:35:36.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.7:22-43.139.1.143:57164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:36.444645 kernel: audit: type=1130 audit(1707788136.351:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.7:22-43.139.1.143:57164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:38.771109 env[1557]: time="2024-02-13T01:35:38.770940890Z" level=info msg="StopPodSandbox for \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\"" Feb 13 01:35:38.822557 env[1557]: time="2024-02-13T01:35:38.822488844Z" level=error msg="StopPodSandbox for \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\" failed" error="failed to destroy network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:38.822794 kubelet[2758]: E0213 01:35:38.822744 2758 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:35:38.822794 kubelet[2758]: E0213 01:35:38.822789 2758 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76} Feb 13 01:35:38.823208 kubelet[2758]: E0213 01:35:38.822835 2758 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2cc0688b-bce9-43e9-8359-74570cd615a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 01:35:38.823208 kubelet[2758]: E0213 01:35:38.822871 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2cc0688b-bce9-43e9-8359-74570cd615a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-vkv8f" podUID=2cc0688b-bce9-43e9-8359-74570cd615a9 Feb 13 01:35:40.761996 env[1557]: time="2024-02-13T01:35:40.761905617Z" level=info msg="StopPodSandbox for \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\"" Feb 13 01:35:40.787995 env[1557]: time="2024-02-13T01:35:40.787927741Z" level=error msg="StopPodSandbox for \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\" failed" error="failed to destroy network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:40.788147 kubelet[2758]: E0213 01:35:40.788105 2758 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:35:40.788147 kubelet[2758]: E0213 01:35:40.788131 2758 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89} Feb 13 01:35:40.788347 kubelet[2758]: E0213 01:35:40.788154 2758 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"01f5d4d2-83e3-48c7-87ce-959645d54c3e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 01:35:40.788347 kubelet[2758]: E0213 01:35:40.788171 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"01f5d4d2-83e3-48c7-87ce-959645d54c3e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85c58d5987-cq5bq" podUID=01f5d4d2-83e3-48c7-87ce-959645d54c3e Feb 13 01:35:41.761340 env[1557]: time="2024-02-13T01:35:41.761242299Z" level=info msg="StopPodSandbox for \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\"" Feb 13 01:35:41.761696 env[1557]: time="2024-02-13T01:35:41.761360160Z" level=info msg="StopPodSandbox for \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\"" Feb 13 01:35:41.782370 env[1557]: time="2024-02-13T01:35:41.782310984Z" level=error msg="StopPodSandbox for \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\" failed" error="failed to destroy network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:41.782370 env[1557]: time="2024-02-13T01:35:41.782311179Z" level=error msg="StopPodSandbox for \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\" failed" error="failed to destroy network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 01:35:41.782629 kubelet[2758]: E0213 01:35:41.782486 2758 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:35:41.782629 kubelet[2758]: E0213 01:35:41.782503 2758 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:35:41.782629 kubelet[2758]: E0213 01:35:41.782513 2758 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee} Feb 13 01:35:41.782629 kubelet[2758]: E0213 01:35:41.782519 2758 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2} Feb 13 01:35:41.782629 kubelet[2758]: E0213 01:35:41.782534 2758 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a2afb53c-b33f-498f-9383-018830c7932b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 01:35:41.782757 kubelet[2758]: E0213 01:35:41.782539 2758 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6a66657b-7973-4ebf-a8cb-c6cb52a5c528\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 01:35:41.782757 kubelet[2758]: E0213 01:35:41.782550 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a2afb53c-b33f-498f-9383-018830c7932b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6fhg4" podUID=a2afb53c-b33f-498f-9383-018830c7932b Feb 13 01:35:41.782757 kubelet[2758]: E0213 01:35:41.782555 2758 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6a66657b-7973-4ebf-a8cb-c6cb52a5c528\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-8bcp4" podUID=6a66657b-7973-4ebf-a8cb-c6cb52a5c528 Feb 13 01:35:44.504582 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount552842066.mount: Deactivated successfully. Feb 13 01:35:44.544691 env[1557]: time="2024-02-13T01:35:44.544664605Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:44.545282 env[1557]: time="2024-02-13T01:35:44.545237919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:44.545821 env[1557]: time="2024-02-13T01:35:44.545775146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:44.546400 env[1557]: time="2024-02-13T01:35:44.546360735Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:35:44.546694 env[1557]: time="2024-02-13T01:35:44.546648770Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 13 01:35:44.550408 env[1557]: time="2024-02-13T01:35:44.550386812Z" level=info msg="CreateContainer within sandbox \"30b9326b277d029badc15ddb6a139a448e9235ebcfb11dffc473d77ad5adad94\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 13 01:35:44.555163 env[1557]: time="2024-02-13T01:35:44.555141550Z" level=info msg="CreateContainer within sandbox \"30b9326b277d029badc15ddb6a139a448e9235ebcfb11dffc473d77ad5adad94\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5972f54eb63fb527fab0c831469d86957bb91d6132a6175a7ef1a60e886abb36\"" Feb 13 01:35:44.555411 env[1557]: time="2024-02-13T01:35:44.555398730Z" level=info msg="StartContainer for \"5972f54eb63fb527fab0c831469d86957bb91d6132a6175a7ef1a60e886abb36\"" Feb 13 01:35:44.579509 env[1557]: time="2024-02-13T01:35:44.579482567Z" level=info msg="StartContainer for \"5972f54eb63fb527fab0c831469d86957bb91d6132a6175a7ef1a60e886abb36\" returns successfully" Feb 13 01:35:44.684316 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 13 01:35:44.684379 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 13 01:35:45.050591 kubelet[2758]: I0213 01:35:45.050534 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-98h2r" podStartSLOduration=-9.223371974804323e+09 pod.CreationTimestamp="2024-02-13 01:34:43 +0000 UTC" firstStartedPulling="2024-02-13 01:34:43.830010262 +0000 UTC m=+18.252040249" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:35:45.048959929 +0000 UTC m=+79.470989979" watchObservedRunningTime="2024-02-13 01:35:45.050452648 +0000 UTC m=+79.472482672" Feb 13 01:35:45.869000 audit[4276]: AVC avc: denied { write } for pid=4276 comm="tee" name="fd" dev="proc" ino=44357 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 01:35:45.869000 audit[4276]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8ccef973 a2=241 a3=1b6 items=1 ppid=4248 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.029965 kernel: audit: type=1400 audit(1707788145.869:291): avc: denied { write } for pid=4276 comm="tee" name="fd" dev="proc" ino=44357 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 01:35:46.030028 kernel: audit: type=1300 audit(1707788145.869:291): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8ccef973 a2=241 a3=1b6 items=1 ppid=4248 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.030044 kernel: audit: type=1307 audit(1707788145.869:291): cwd="/etc/service/enabled/cni/log" Feb 13 01:35:45.869000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 13 01:35:46.059631 kernel: audit: type=1302 audit(1707788145.869:291): item=0 name="/dev/fd/63" inode=42263 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:35:45.869000 audit: PATH item=0 name="/dev/fd/63" inode=42263 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:35:46.123984 kernel: audit: type=1327 audit(1707788145.869:291): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 01:35:45.869000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 01:35:46.185410 kernel: audit: type=1400 audit(1707788145.870:292): avc: denied { write } for pid=4280 comm="tee" name="fd" dev="proc" ino=31571 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 01:35:45.870000 audit[4280]: AVC avc: denied { write } for pid=4280 comm="tee" name="fd" dev="proc" ino=31571 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 01:35:46.249510 kernel: audit: type=1300 audit(1707788145.870:292): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe07977971 a2=241 a3=1b6 items=1 ppid=4246 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:45.870000 audit[4280]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe07977971 a2=241 a3=1b6 items=1 ppid=4246 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.344959 kernel: audit: type=1307 audit(1707788145.870:292): cwd="/etc/service/enabled/bird6/log" Feb 13 01:35:45.870000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 13 01:35:46.374733 kernel: audit: type=1302 audit(1707788145.870:292): item=0 name="/dev/fd/63" inode=31568 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:35:45.870000 audit: PATH item=0 name="/dev/fd/63" inode=31568 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:35:46.438589 kernel: audit: type=1327 audit(1707788145.870:292): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 01:35:45.870000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 01:35:45.870000 audit[4283]: AVC avc: denied { write } for pid=4283 comm="tee" name="fd" dev="proc" ino=35410 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 01:35:45.870000 audit[4283]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff71fb0962 a2=241 a3=1b6 items=1 ppid=4249 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:45.870000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 13 01:35:45.870000 audit: PATH item=0 name="/dev/fd/63" inode=35407 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:35:45.870000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 01:35:45.870000 audit[4288]: AVC avc: denied { write } for pid=4288 comm="tee" name="fd" dev="proc" ino=38358 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 01:35:45.870000 audit[4288]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc77e1f971 a2=241 a3=1b6 items=1 ppid=4247 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:45.870000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 13 01:35:45.870000 audit: PATH item=0 name="/dev/fd/63" inode=38355 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:35:45.870000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 01:35:45.871000 audit[4286]: AVC avc: denied { write } for pid=4286 comm="tee" name="fd" dev="proc" ino=32732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 01:35:45.871000 audit[4286]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe84c64971 a2=241 a3=1b6 items=1 ppid=4250 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:45.871000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 13 01:35:45.871000 audit: PATH item=0 name="/dev/fd/63" inode=36156 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:35:45.871000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 01:35:45.872000 audit[4302]: AVC avc: denied { write } for pid=4302 comm="tee" name="fd" dev="proc" ino=42266 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 01:35:45.872000 audit[4302]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde6813972 a2=241 a3=1b6 items=1 ppid=4251 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:45.872000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 13 01:35:45.872000 audit: PATH item=0 name="/dev/fd/63" inode=36157 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:35:45.872000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 01:35:45.873000 audit[4289]: AVC avc: denied { write } for pid=4289 comm="tee" name="fd" dev="proc" ino=44361 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 01:35:45.873000 audit[4289]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec781b961 a2=241 a3=1b6 items=1 ppid=4244 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:45.873000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 13 01:35:45.873000 audit: PATH item=0 name="/dev/fd/63" inode=34563 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 01:35:45.873000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit: BPF prog-id=10 op=LOAD Feb 13 01:35:46.500000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe929e6a80 a2=70 a3=7f07a1a74000 items=0 ppid=4255 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 01:35:46.500000 audit: BPF prog-id=10 op=UNLOAD Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit: BPF prog-id=11 op=LOAD Feb 13 01:35:46.500000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe929e6a80 a2=70 a3=6e items=0 ppid=4255 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 01:35:46.500000 audit: BPF prog-id=11 op=UNLOAD Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe929e6a30 a2=70 a3=7ffe929e6a80 items=0 ppid=4255 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit: BPF prog-id=12 op=LOAD Feb 13 01:35:46.500000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe929e6a10 a2=70 a3=7ffe929e6a80 items=0 ppid=4255 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 01:35:46.500000 audit: BPF prog-id=12 op=UNLOAD Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe929e6af0 a2=70 a3=0 items=0 ppid=4255 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe929e6ae0 a2=70 a3=0 items=0 ppid=4255 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe929e6b20 a2=70 a3=0 items=0 ppid=4255 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.500000 audit: BPF prog-id=13 op=LOAD Feb 13 01:35:46.500000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe929e6a40 a2=70 a3=ffffffff items=0 ppid=4255 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 01:35:46.502000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.502000 audit[4447]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdb01a8b0 a2=70 a3=fff80800 items=0 ppid=4255 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 13 01:35:46.502000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 01:35:46.502000 audit[4447]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdb01a780 a2=70 a3=3 items=0 ppid=4255 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 13 01:35:46.514000 audit: BPF prog-id=13 op=UNLOAD Feb 13 01:35:46.537000 audit[4508]: NETFILTER_CFG table=mangle:111 family=2 entries=19 op=nft_register_chain pid=4508 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:35:46.537000 audit[4508]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd399b6680 a2=0 a3=7ffd399b666c items=0 ppid=4255 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.537000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:35:46.538000 audit[4503]: NETFILTER_CFG table=raw:112 family=2 entries=19 op=nft_register_chain pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:35:46.538000 audit[4503]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd72406080 a2=0 a3=55e6336e3000 items=0 ppid=4255 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.538000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:35:46.538000 audit[4504]: NETFILTER_CFG table=nat:113 family=2 entries=16 op=nft_register_chain pid=4504 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:35:46.538000 audit[4504]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffdcca98aa0 a2=0 a3=557e0fd9b000 items=0 ppid=4255 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.538000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:35:46.539000 audit[4506]: NETFILTER_CFG table=filter:114 family=2 entries=39 op=nft_register_chain pid=4506 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:35:46.539000 audit[4506]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe8293fae0 a2=0 a3=555846d84000 items=0 ppid=4255 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:46.539000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:35:46.968095 systemd-networkd[1407]: vxlan.calico: Link UP Feb 13 01:35:46.968110 systemd-networkd[1407]: vxlan.calico: Gained carrier Feb 13 01:35:48.107976 systemd-networkd[1407]: vxlan.calico: Gained IPv6LL Feb 13 01:35:52.761425 env[1557]: time="2024-02-13T01:35:52.761337778Z" level=info msg="StopPodSandbox for \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\"" Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.797 [INFO][4539] k8s.go 578: Cleaning up netns ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.797 [INFO][4539] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" iface="eth0" netns="/var/run/netns/cni-34c5bab5-0a8c-c54c-47c5-ad4ffdd65583" Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.797 [INFO][4539] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" iface="eth0" netns="/var/run/netns/cni-34c5bab5-0a8c-c54c-47c5-ad4ffdd65583" Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.797 [INFO][4539] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" iface="eth0" netns="/var/run/netns/cni-34c5bab5-0a8c-c54c-47c5-ad4ffdd65583" Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.797 [INFO][4539] k8s.go 585: Releasing IP address(es) ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.797 [INFO][4539] utils.go 188: Calico CNI releasing IP address ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.806 [INFO][4552] ipam_plugin.go 415: Releasing address using handleID ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" HandleID="k8s-pod-network.1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.806 [INFO][4552] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.806 [INFO][4552] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.811 [WARNING][4552] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" HandleID="k8s-pod-network.1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.811 [INFO][4552] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" HandleID="k8s-pod-network.1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.812 [INFO][4552] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:35:52.813562 env[1557]: 2024-02-13 01:35:52.812 [INFO][4539] k8s.go 591: Teardown processing complete. ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:35:52.813892 env[1557]: time="2024-02-13T01:35:52.813637725Z" level=info msg="TearDown network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\" successfully" Feb 13 01:35:52.813892 env[1557]: time="2024-02-13T01:35:52.813661084Z" level=info msg="StopPodSandbox for \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\" returns successfully" Feb 13 01:35:52.814095 env[1557]: time="2024-02-13T01:35:52.814080733Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-8bcp4,Uid:6a66657b-7973-4ebf-a8cb-c6cb52a5c528,Namespace:kube-system,Attempt:1,}" Feb 13 01:35:52.815148 systemd[1]: run-netns-cni\x2d34c5bab5\x2d0a8c\x2dc54c\x2d47c5\x2dad4ffdd65583.mount: Deactivated successfully. Feb 13 01:35:52.906690 systemd-networkd[1407]: calif7acfb59803: Link UP Feb 13 01:35:52.970687 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 01:35:52.970732 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif7acfb59803: link becomes ready Feb 13 01:35:52.970703 systemd-networkd[1407]: calif7acfb59803: Gained carrier Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.836 [INFO][4573] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0 coredns-787d4945fb- kube-system 6a66657b-7973-4ebf-a8cb-c6cb52a5c528 772 0 2024-02-13 01:34:38 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-ab9b2e6956 coredns-787d4945fb-8bcp4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif7acfb59803 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Namespace="kube-system" Pod="coredns-787d4945fb-8bcp4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.836 [INFO][4573] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Namespace="kube-system" Pod="coredns-787d4945fb-8bcp4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.852 [INFO][4596] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" HandleID="k8s-pod-network.b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.859 [INFO][4596] ipam_plugin.go 268: Auto assigning IP ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" HandleID="k8s-pod-network.b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c12e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-ab9b2e6956", "pod":"coredns-787d4945fb-8bcp4", "timestamp":"2024-02-13 01:35:52.852788033 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ab9b2e6956", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.860 [INFO][4596] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.860 [INFO][4596] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.860 [INFO][4596] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ab9b2e6956' Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.861 [INFO][4596] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.865 [INFO][4596] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.868 [INFO][4596] ipam.go 489: Trying affinity for 192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.869 [INFO][4596] ipam.go 155: Attempting to load block cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.873 [INFO][4596] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.873 [INFO][4596] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.67.0/26 handle="k8s-pod-network.b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.877 [INFO][4596] ipam.go 1682: Creating new handle: k8s-pod-network.b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040 Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.884 [INFO][4596] ipam.go 1203: Writing block in order to claim IPs block=192.168.67.0/26 handle="k8s-pod-network.b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.894 [INFO][4596] ipam.go 1216: Successfully claimed IPs: [192.168.67.1/26] block=192.168.67.0/26 handle="k8s-pod-network.b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.894 [INFO][4596] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.67.1/26] handle="k8s-pod-network.b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.894 [INFO][4596] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:35:52.976004 env[1557]: 2024-02-13 01:35:52.894 [INFO][4596] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.67.1/26] IPv6=[] ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" HandleID="k8s-pod-network.b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:35:52.976479 env[1557]: 2024-02-13 01:35:52.903 [INFO][4573] k8s.go 385: Populated endpoint ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Namespace="kube-system" Pod="coredns-787d4945fb-8bcp4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6a66657b-7973-4ebf-a8cb-c6cb52a5c528", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"", Pod:"coredns-787d4945fb-8bcp4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7acfb59803", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:35:52.976479 env[1557]: 2024-02-13 01:35:52.903 [INFO][4573] k8s.go 386: Calico CNI using IPs: [192.168.67.1/32] ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Namespace="kube-system" Pod="coredns-787d4945fb-8bcp4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:35:52.976479 env[1557]: 2024-02-13 01:35:52.903 [INFO][4573] dataplane_linux.go 68: Setting the host side veth name to calif7acfb59803 ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Namespace="kube-system" Pod="coredns-787d4945fb-8bcp4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:35:52.976479 env[1557]: 2024-02-13 01:35:52.970 [INFO][4573] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Namespace="kube-system" Pod="coredns-787d4945fb-8bcp4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:35:52.976479 env[1557]: 2024-02-13 01:35:52.970 [INFO][4573] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Namespace="kube-system" Pod="coredns-787d4945fb-8bcp4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6a66657b-7973-4ebf-a8cb-c6cb52a5c528", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040", Pod:"coredns-787d4945fb-8bcp4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7acfb59803", MAC:"3e:95:ee:c6:fd:37", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:35:52.976479 env[1557]: 2024-02-13 01:35:52.975 [INFO][4573] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040" Namespace="kube-system" Pod="coredns-787d4945fb-8bcp4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:35:52.981300 env[1557]: time="2024-02-13T01:35:52.981198252Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:35:52.981300 env[1557]: time="2024-02-13T01:35:52.981217452Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:35:52.981300 env[1557]: time="2024-02-13T01:35:52.981224397Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:35:52.981300 env[1557]: time="2024-02-13T01:35:52.981283064Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040 pid=4636 runtime=io.containerd.runc.v2 Feb 13 01:35:52.980000 audit[4644]: NETFILTER_CFG table=filter:115 family=2 entries=36 op=nft_register_chain pid=4644 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:35:53.008359 kernel: kauditd_printk_skb: 108 callbacks suppressed Feb 13 01:35:53.008447 kernel: audit: type=1325 audit(1707788152.980:316): table=filter:115 family=2 entries=36 op=nft_register_chain pid=4644 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:35:52.980000 audit[4644]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffef59d2600 a2=0 a3=7ffef59d25ec items=0 ppid=4255 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:53.065676 kernel: audit: type=1300 audit(1707788152.980:316): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffef59d2600 a2=0 a3=7ffef59d25ec items=0 ppid=4255 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:52.980000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:35:53.219464 kernel: audit: type=1327 audit(1707788152.980:316): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:35:53.235378 env[1557]: time="2024-02-13T01:35:53.235356144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-8bcp4,Uid:6a66657b-7973-4ebf-a8cb-c6cb52a5c528,Namespace:kube-system,Attempt:1,} returns sandbox id \"b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040\"" Feb 13 01:35:53.236495 env[1557]: time="2024-02-13T01:35:53.236480893Z" level=info msg="CreateContainer within sandbox \"b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 13 01:35:53.240154 env[1557]: time="2024-02-13T01:35:53.240141458Z" level=info msg="CreateContainer within sandbox \"b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"34f297fefc54f5f79f765c11300766a58190899472d1fb4d74c60f9c22d769c7\"" Feb 13 01:35:53.240329 env[1557]: time="2024-02-13T01:35:53.240314955Z" level=info msg="StartContainer for \"34f297fefc54f5f79f765c11300766a58190899472d1fb4d74c60f9c22d769c7\"" Feb 13 01:35:53.260199 env[1557]: time="2024-02-13T01:35:53.260152313Z" level=info msg="StartContainer for \"34f297fefc54f5f79f765c11300766a58190899472d1fb4d74c60f9c22d769c7\" returns successfully" Feb 13 01:35:53.761194 env[1557]: time="2024-02-13T01:35:53.761066049Z" level=info msg="StopPodSandbox for \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\"" Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.797 [INFO][4732] k8s.go 578: Cleaning up netns ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.797 [INFO][4732] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" iface="eth0" netns="/var/run/netns/cni-fa75ab1c-c411-3e9d-4ad9-ae40c044f074" Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.797 [INFO][4732] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" iface="eth0" netns="/var/run/netns/cni-fa75ab1c-c411-3e9d-4ad9-ae40c044f074" Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.797 [INFO][4732] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" iface="eth0" netns="/var/run/netns/cni-fa75ab1c-c411-3e9d-4ad9-ae40c044f074" Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.797 [INFO][4732] k8s.go 585: Releasing IP address(es) ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.797 [INFO][4732] utils.go 188: Calico CNI releasing IP address ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.809 [INFO][4748] ipam_plugin.go 415: Releasing address using handleID ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" HandleID="k8s-pod-network.3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.809 [INFO][4748] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.809 [INFO][4748] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.814 [WARNING][4748] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" HandleID="k8s-pod-network.3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.814 [INFO][4748] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" HandleID="k8s-pod-network.3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.815 [INFO][4748] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:35:53.817240 env[1557]: 2024-02-13 01:35:53.816 [INFO][4732] k8s.go 591: Teardown processing complete. ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:35:53.817876 env[1557]: time="2024-02-13T01:35:53.817321095Z" level=info msg="TearDown network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\" successfully" Feb 13 01:35:53.817876 env[1557]: time="2024-02-13T01:35:53.817346371Z" level=info msg="StopPodSandbox for \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\" returns successfully" Feb 13 01:35:53.818777 env[1557]: time="2024-02-13T01:35:53.818716641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6fhg4,Uid:a2afb53c-b33f-498f-9383-018830c7932b,Namespace:calico-system,Attempt:1,}" Feb 13 01:35:53.819289 systemd[1]: run-netns-cni\x2dfa75ab1c\x2dc411\x2d3e9d\x2d4ad9\x2dae40c044f074.mount: Deactivated successfully. Feb 13 01:35:53.885074 systemd-networkd[1407]: calib538f53c6e7: Link UP Feb 13 01:35:53.912655 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib538f53c6e7: link becomes ready Feb 13 01:35:53.912783 systemd-networkd[1407]: calib538f53c6e7: Gained carrier Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.843 [INFO][4764] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0 csi-node-driver- calico-system a2afb53c-b33f-498f-9383-018830c7932b 782 0 2024-02-13 01:34:43 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-ab9b2e6956 csi-node-driver-6fhg4 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calib538f53c6e7 [] []}} ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Namespace="calico-system" Pod="csi-node-driver-6fhg4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.843 [INFO][4764] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Namespace="calico-system" Pod="csi-node-driver-6fhg4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.859 [INFO][4784] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" HandleID="k8s-pod-network.a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.866 [INFO][4784] ipam_plugin.go 268: Auto assigning IP ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" HandleID="k8s-pod-network.a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051920), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-ab9b2e6956", "pod":"csi-node-driver-6fhg4", "timestamp":"2024-02-13 01:35:53.859936213 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ab9b2e6956", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.866 [INFO][4784] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.866 [INFO][4784] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.866 [INFO][4784] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ab9b2e6956' Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.868 [INFO][4784] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.871 [INFO][4784] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.873 [INFO][4784] ipam.go 489: Trying affinity for 192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.875 [INFO][4784] ipam.go 155: Attempting to load block cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.876 [INFO][4784] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.876 [INFO][4784] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.67.0/26 handle="k8s-pod-network.a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.878 [INFO][4784] ipam.go 1682: Creating new handle: k8s-pod-network.a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015 Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.880 [INFO][4784] ipam.go 1203: Writing block in order to claim IPs block=192.168.67.0/26 handle="k8s-pod-network.a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.883 [INFO][4784] ipam.go 1216: Successfully claimed IPs: [192.168.67.2/26] block=192.168.67.0/26 handle="k8s-pod-network.a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.883 [INFO][4784] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.67.2/26] handle="k8s-pod-network.a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.883 [INFO][4784] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:35:53.918337 env[1557]: 2024-02-13 01:35:53.883 [INFO][4784] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.67.2/26] IPv6=[] ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" HandleID="k8s-pod-network.a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:35:53.918874 env[1557]: 2024-02-13 01:35:53.884 [INFO][4764] k8s.go 385: Populated endpoint ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Namespace="calico-system" Pod="csi-node-driver-6fhg4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2afb53c-b33f-498f-9383-018830c7932b", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"", Pod:"csi-node-driver-6fhg4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib538f53c6e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:35:53.918874 env[1557]: 2024-02-13 01:35:53.884 [INFO][4764] k8s.go 386: Calico CNI using IPs: [192.168.67.2/32] ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Namespace="calico-system" Pod="csi-node-driver-6fhg4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:35:53.918874 env[1557]: 2024-02-13 01:35:53.884 [INFO][4764] dataplane_linux.go 68: Setting the host side veth name to calib538f53c6e7 ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Namespace="calico-system" Pod="csi-node-driver-6fhg4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:35:53.918874 env[1557]: 2024-02-13 01:35:53.912 [INFO][4764] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Namespace="calico-system" Pod="csi-node-driver-6fhg4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:35:53.918874 env[1557]: 2024-02-13 01:35:53.912 [INFO][4764] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Namespace="calico-system" Pod="csi-node-driver-6fhg4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2afb53c-b33f-498f-9383-018830c7932b", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015", Pod:"csi-node-driver-6fhg4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib538f53c6e7", MAC:"fe:38:59:eb:ed:a4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:35:53.918874 env[1557]: 2024-02-13 01:35:53.917 [INFO][4764] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015" Namespace="calico-system" Pod="csi-node-driver-6fhg4" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:35:53.924151 env[1557]: time="2024-02-13T01:35:53.924106955Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:35:53.924151 env[1557]: time="2024-02-13T01:35:53.924131220Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:35:53.924151 env[1557]: time="2024-02-13T01:35:53.924138229Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:35:53.924319 env[1557]: time="2024-02-13T01:35:53.924206927Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015 pid=4821 runtime=io.containerd.runc.v2 Feb 13 01:35:53.923000 audit[4830]: NETFILTER_CFG table=filter:116 family=2 entries=40 op=nft_register_chain pid=4830 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:35:53.923000 audit[4830]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffe380c0550 a2=0 a3=7ffe380c053c items=0 ppid=4255 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:54.048226 kubelet[2758]: I0213 01:35:54.048163 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-8bcp4" podStartSLOduration=76.048143175 pod.CreationTimestamp="2024-02-13 01:34:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:35:54.047956317 +0000 UTC m=+88.469986302" watchObservedRunningTime="2024-02-13 01:35:54.048143175 +0000 UTC m=+88.470173153" Feb 13 01:35:54.076357 kernel: audit: type=1325 audit(1707788153.923:317): table=filter:116 family=2 entries=40 op=nft_register_chain pid=4830 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:35:54.076424 kernel: audit: type=1300 audit(1707788153.923:317): arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffe380c0550 a2=0 a3=7ffe380c053c items=0 ppid=4255 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:54.076454 kernel: audit: type=1327 audit(1707788153.923:317): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:35:53.923000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:35:54.140635 env[1557]: time="2024-02-13T01:35:54.140601096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6fhg4,Uid:a2afb53c-b33f-498f-9383-018830c7932b,Namespace:calico-system,Attempt:1,} returns sandbox id \"a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015\"" Feb 13 01:35:54.141288 env[1557]: time="2024-02-13T01:35:54.141274420Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 13 01:35:54.152000 audit[4881]: NETFILTER_CFG table=filter:117 family=2 entries=12 op=nft_register_rule pid=4881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:54.210677 kernel: audit: type=1325 audit(1707788154.152:318): table=filter:117 family=2 entries=12 op=nft_register_rule pid=4881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:54.210716 kernel: audit: type=1300 audit(1707788154.152:318): arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff646ad500 a2=0 a3=7fff646ad4ec items=0 ppid=3066 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:54.152000 audit[4881]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff646ad500 a2=0 a3=7fff646ad4ec items=0 ppid=3066 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:54.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:54.360249 kernel: audit: type=1327 audit(1707788154.152:318): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:54.368000 audit[4881]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=4881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:54.368000 audit[4881]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fff646ad500 a2=0 a3=7fff646ad4ec items=0 ppid=3066 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:54.368000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:54.427705 kernel: audit: type=1325 audit(1707788154.368:319): table=nat:118 family=2 entries=30 op=nft_register_rule pid=4881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:54.453000 audit[4907]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:54.453000 audit[4907]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffece6eee00 a2=0 a3=7ffece6eedec items=0 ppid=3066 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:54.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:54.480000 audit[4907]: NETFILTER_CFG table=nat:120 family=2 entries=51 op=nft_register_chain pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:54.480000 audit[4907]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffece6eee00 a2=0 a3=7ffece6eedec items=0 ppid=3066 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:54.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:54.699912 systemd-networkd[1407]: calif7acfb59803: Gained IPv6LL Feb 13 01:35:54.761057 env[1557]: time="2024-02-13T01:35:54.760943581Z" level=info msg="StopPodSandbox for \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\"" Feb 13 01:35:54.761057 env[1557]: time="2024-02-13T01:35:54.760966311Z" level=info msg="StopPodSandbox for \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\"" Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.824 [INFO][4942] k8s.go 578: Cleaning up netns ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.824 [INFO][4942] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" iface="eth0" netns="/var/run/netns/cni-e1b7d2ce-5f9c-3d3a-4dda-0e0b578dadaf" Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.824 [INFO][4942] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" iface="eth0" netns="/var/run/netns/cni-e1b7d2ce-5f9c-3d3a-4dda-0e0b578dadaf" Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.824 [INFO][4942] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" iface="eth0" netns="/var/run/netns/cni-e1b7d2ce-5f9c-3d3a-4dda-0e0b578dadaf" Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.824 [INFO][4942] k8s.go 585: Releasing IP address(es) ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.824 [INFO][4942] utils.go 188: Calico CNI releasing IP address ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.840 [INFO][4974] ipam_plugin.go 415: Releasing address using handleID ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" HandleID="k8s-pod-network.4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.840 [INFO][4974] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.840 [INFO][4974] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.847 [WARNING][4974] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" HandleID="k8s-pod-network.4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.847 [INFO][4974] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" HandleID="k8s-pod-network.4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.848 [INFO][4974] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:35:54.850574 env[1557]: 2024-02-13 01:35:54.849 [INFO][4942] k8s.go 591: Teardown processing complete. ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:35:54.851295 env[1557]: time="2024-02-13T01:35:54.850674628Z" level=info msg="TearDown network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\" successfully" Feb 13 01:35:54.851295 env[1557]: time="2024-02-13T01:35:54.850707143Z" level=info msg="StopPodSandbox for \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\" returns successfully" Feb 13 01:35:54.851295 env[1557]: time="2024-02-13T01:35:54.851229682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-vkv8f,Uid:2cc0688b-bce9-43e9-8359-74570cd615a9,Namespace:kube-system,Attempt:1,}" Feb 13 01:35:54.854728 systemd[1]: run-netns-cni\x2de1b7d2ce\x2d5f9c\x2d3d3a\x2d4dda\x2d0e0b578dadaf.mount: Deactivated successfully. Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.826 [INFO][4941] k8s.go 578: Cleaning up netns ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.826 [INFO][4941] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" iface="eth0" netns="/var/run/netns/cni-2dd8a17f-35fc-b0b1-af2b-307d267f8634" Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.826 [INFO][4941] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" iface="eth0" netns="/var/run/netns/cni-2dd8a17f-35fc-b0b1-af2b-307d267f8634" Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.826 [INFO][4941] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" iface="eth0" netns="/var/run/netns/cni-2dd8a17f-35fc-b0b1-af2b-307d267f8634" Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.826 [INFO][4941] k8s.go 585: Releasing IP address(es) ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.826 [INFO][4941] utils.go 188: Calico CNI releasing IP address ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.843 [INFO][4978] ipam_plugin.go 415: Releasing address using handleID ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" HandleID="k8s-pod-network.b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.843 [INFO][4978] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.848 [INFO][4978] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.854 [WARNING][4978] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" HandleID="k8s-pod-network.b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.854 [INFO][4978] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" HandleID="k8s-pod-network.b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.856 [INFO][4978] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:35:54.858776 env[1557]: 2024-02-13 01:35:54.857 [INFO][4941] k8s.go 591: Teardown processing complete. ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:35:54.859334 env[1557]: time="2024-02-13T01:35:54.858894117Z" level=info msg="TearDown network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\" successfully" Feb 13 01:35:54.859334 env[1557]: time="2024-02-13T01:35:54.858920549Z" level=info msg="StopPodSandbox for \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\" returns successfully" Feb 13 01:35:54.859431 env[1557]: time="2024-02-13T01:35:54.859409319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85c58d5987-cq5bq,Uid:01f5d4d2-83e3-48c7-87ce-959645d54c3e,Namespace:calico-system,Attempt:1,}" Feb 13 01:35:54.866117 systemd[1]: run-netns-cni\x2d2dd8a17f\x2d35fc\x2db0b1\x2daf2b\x2d307d267f8634.mount: Deactivated successfully. Feb 13 01:35:54.940026 systemd-networkd[1407]: caliee9142c9626: Link UP Feb 13 01:35:54.994034 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 01:35:54.994095 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliee9142c9626: link becomes ready Feb 13 01:35:54.994355 systemd-networkd[1407]: caliee9142c9626: Gained carrier Feb 13 01:35:54.994681 systemd-networkd[1407]: calia23bdf13c56: Link UP Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.883 [INFO][5006] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0 coredns-787d4945fb- kube-system 2cc0688b-bce9-43e9-8359-74570cd615a9 798 0 2024-02-13 01:34:38 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-ab9b2e6956 coredns-787d4945fb-vkv8f eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliee9142c9626 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Namespace="kube-system" Pod="coredns-787d4945fb-vkv8f" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.883 [INFO][5006] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Namespace="kube-system" Pod="coredns-787d4945fb-vkv8f" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.902 [INFO][5047] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" HandleID="k8s-pod-network.eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.913 [INFO][5047] ipam_plugin.go 268: Auto assigning IP ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" HandleID="k8s-pod-network.eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b51c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-ab9b2e6956", "pod":"coredns-787d4945fb-vkv8f", "timestamp":"2024-02-13 01:35:54.902863904 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ab9b2e6956", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.913 [INFO][5047] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.913 [INFO][5047] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.913 [INFO][5047] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ab9b2e6956' Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.915 [INFO][5047] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.919 [INFO][5047] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.922 [INFO][5047] ipam.go 489: Trying affinity for 192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.924 [INFO][5047] ipam.go 155: Attempting to load block cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.928 [INFO][5047] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.928 [INFO][5047] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.67.0/26 handle="k8s-pod-network.eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.930 [INFO][5047] ipam.go 1682: Creating new handle: k8s-pod-network.eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.933 [INFO][5047] ipam.go 1203: Writing block in order to claim IPs block=192.168.67.0/26 handle="k8s-pod-network.eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.937 [INFO][5047] ipam.go 1216: Successfully claimed IPs: [192.168.67.3/26] block=192.168.67.0/26 handle="k8s-pod-network.eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.937 [INFO][5047] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.67.3/26] handle="k8s-pod-network.eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.937 [INFO][5047] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:35:54.999768 env[1557]: 2024-02-13 01:35:54.937 [INFO][5047] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.67.3/26] IPv6=[] ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" HandleID="k8s-pod-network.eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:35:55.000251 env[1557]: 2024-02-13 01:35:54.938 [INFO][5006] k8s.go 385: Populated endpoint ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Namespace="kube-system" Pod="coredns-787d4945fb-vkv8f" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"2cc0688b-bce9-43e9-8359-74570cd615a9", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"", Pod:"coredns-787d4945fb-vkv8f", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee9142c9626", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:35:55.000251 env[1557]: 2024-02-13 01:35:54.939 [INFO][5006] k8s.go 386: Calico CNI using IPs: [192.168.67.3/32] ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Namespace="kube-system" Pod="coredns-787d4945fb-vkv8f" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:35:55.000251 env[1557]: 2024-02-13 01:35:54.939 [INFO][5006] dataplane_linux.go 68: Setting the host side veth name to caliee9142c9626 ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Namespace="kube-system" Pod="coredns-787d4945fb-vkv8f" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:35:55.000251 env[1557]: 2024-02-13 01:35:54.994 [INFO][5006] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Namespace="kube-system" Pod="coredns-787d4945fb-vkv8f" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:35:55.000251 env[1557]: 2024-02-13 01:35:54.994 [INFO][5006] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Namespace="kube-system" Pod="coredns-787d4945fb-vkv8f" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"2cc0688b-bce9-43e9-8359-74570cd615a9", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d", Pod:"coredns-787d4945fb-vkv8f", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee9142c9626", MAC:"12:b3:10:06:5b:55", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:35:55.000251 env[1557]: 2024-02-13 01:35:54.998 [INFO][5006] k8s.go 491: Wrote updated endpoint to datastore ContainerID="eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d" Namespace="kube-system" Pod="coredns-787d4945fb-vkv8f" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:35:55.005428 env[1557]: time="2024-02-13T01:35:55.005394962Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:35:55.005428 env[1557]: time="2024-02-13T01:35:55.005417106Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:35:55.005428 env[1557]: time="2024-02-13T01:35:55.005424529Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:35:55.005542 env[1557]: time="2024-02-13T01:35:55.005486875Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d pid=5105 runtime=io.containerd.runc.v2 Feb 13 01:35:55.004000 audit[5106]: NETFILTER_CFG table=filter:121 family=2 entries=34 op=nft_register_chain pid=5106 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:35:55.004000 audit[5106]: SYSCALL arch=c000003e syscall=46 success=yes exit=17900 a0=3 a1=7ffda325a9e0 a2=0 a3=7ffda325a9cc items=0 ppid=4255 pid=5106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:55.004000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:35:55.021653 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia23bdf13c56: link becomes ready Feb 13 01:35:55.022016 systemd-networkd[1407]: calia23bdf13c56: Gained carrier Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.888 [INFO][5019] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0 calico-kube-controllers-85c58d5987- calico-system 01f5d4d2-83e3-48c7-87ce-959645d54c3e 799 0 2024-02-13 01:34:43 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:85c58d5987 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-ab9b2e6956 calico-kube-controllers-85c58d5987-cq5bq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia23bdf13c56 [] []}} ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Namespace="calico-system" Pod="calico-kube-controllers-85c58d5987-cq5bq" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.888 [INFO][5019] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Namespace="calico-system" Pod="calico-kube-controllers-85c58d5987-cq5bq" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.908 [INFO][5058] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" HandleID="k8s-pod-network.ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.916 [INFO][5058] ipam_plugin.go 268: Auto assigning IP ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" HandleID="k8s-pod-network.ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b5910), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-ab9b2e6956", "pod":"calico-kube-controllers-85c58d5987-cq5bq", "timestamp":"2024-02-13 01:35:54.908801647 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ab9b2e6956", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.916 [INFO][5058] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.937 [INFO][5058] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.937 [INFO][5058] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ab9b2e6956' Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.939 [INFO][5058] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.943 [INFO][5058] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.946 [INFO][5058] ipam.go 489: Trying affinity for 192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.947 [INFO][5058] ipam.go 155: Attempting to load block cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.949 [INFO][5058] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.949 [INFO][5058] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.67.0/26 handle="k8s-pod-network.ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.951 [INFO][5058] ipam.go 1682: Creating new handle: k8s-pod-network.ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29 Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.954 [INFO][5058] ipam.go 1203: Writing block in order to claim IPs block=192.168.67.0/26 handle="k8s-pod-network.ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.957 [INFO][5058] ipam.go 1216: Successfully claimed IPs: [192.168.67.4/26] block=192.168.67.0/26 handle="k8s-pod-network.ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.957 [INFO][5058] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.67.4/26] handle="k8s-pod-network.ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.958 [INFO][5058] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:35:55.035995 env[1557]: 2024-02-13 01:35:54.958 [INFO][5058] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.67.4/26] IPv6=[] ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" HandleID="k8s-pod-network.ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:35:55.036467 env[1557]: 2024-02-13 01:35:54.959 [INFO][5019] k8s.go 385: Populated endpoint ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Namespace="calico-system" Pod="calico-kube-controllers-85c58d5987-cq5bq" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0", GenerateName:"calico-kube-controllers-85c58d5987-", Namespace:"calico-system", SelfLink:"", UID:"01f5d4d2-83e3-48c7-87ce-959645d54c3e", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85c58d5987", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"", Pod:"calico-kube-controllers-85c58d5987-cq5bq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.67.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia23bdf13c56", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:35:55.036467 env[1557]: 2024-02-13 01:35:54.959 [INFO][5019] k8s.go 386: Calico CNI using IPs: [192.168.67.4/32] ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Namespace="calico-system" Pod="calico-kube-controllers-85c58d5987-cq5bq" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:35:55.036467 env[1557]: 2024-02-13 01:35:54.959 [INFO][5019] dataplane_linux.go 68: Setting the host side veth name to calia23bdf13c56 ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Namespace="calico-system" Pod="calico-kube-controllers-85c58d5987-cq5bq" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:35:55.036467 env[1557]: 2024-02-13 01:35:55.021 [INFO][5019] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Namespace="calico-system" Pod="calico-kube-controllers-85c58d5987-cq5bq" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:35:55.036467 env[1557]: 2024-02-13 01:35:55.030 [INFO][5019] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Namespace="calico-system" Pod="calico-kube-controllers-85c58d5987-cq5bq" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0", GenerateName:"calico-kube-controllers-85c58d5987-", Namespace:"calico-system", SelfLink:"", UID:"01f5d4d2-83e3-48c7-87ce-959645d54c3e", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85c58d5987", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29", Pod:"calico-kube-controllers-85c58d5987-cq5bq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.67.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia23bdf13c56", MAC:"3a:b0:27:18:39:e3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:35:55.036467 env[1557]: 2024-02-13 01:35:55.035 [INFO][5019] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29" Namespace="calico-system" Pod="calico-kube-controllers-85c58d5987-cq5bq" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:35:55.041535 env[1557]: time="2024-02-13T01:35:55.041503269Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:35:55.041535 env[1557]: time="2024-02-13T01:35:55.041523720Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:35:55.041535 env[1557]: time="2024-02-13T01:35:55.041530688Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:35:55.041682 env[1557]: time="2024-02-13T01:35:55.041602638Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29 pid=5154 runtime=io.containerd.runc.v2 Feb 13 01:35:55.040000 audit[5156]: NETFILTER_CFG table=filter:122 family=2 entries=42 op=nft_register_chain pid=5156 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:35:55.040000 audit[5156]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffc5bd44b30 a2=0 a3=7ffc5bd44b1c items=0 ppid=4255 pid=5156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:55.040000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:35:55.045256 env[1557]: time="2024-02-13T01:35:55.045209371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-vkv8f,Uid:2cc0688b-bce9-43e9-8359-74570cd615a9,Namespace:kube-system,Attempt:1,} returns sandbox id \"eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d\"" Feb 13 01:35:55.046368 env[1557]: time="2024-02-13T01:35:55.046352763Z" level=info msg="CreateContainer within sandbox \"eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 13 01:35:55.050302 env[1557]: time="2024-02-13T01:35:55.050269748Z" level=info msg="CreateContainer within sandbox \"eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"59c46cbeb162ae28a7f3a866b709995501a46374085ae3ddaf6b94ed3ee9a98e\"" Feb 13 01:35:55.050540 env[1557]: time="2024-02-13T01:35:55.050527673Z" level=info msg="StartContainer for \"59c46cbeb162ae28a7f3a866b709995501a46374085ae3ddaf6b94ed3ee9a98e\"" Feb 13 01:35:55.070116 env[1557]: time="2024-02-13T01:35:55.070083977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85c58d5987-cq5bq,Uid:01f5d4d2-83e3-48c7-87ce-959645d54c3e,Namespace:calico-system,Attempt:1,} returns sandbox id \"ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29\"" Feb 13 01:35:55.070489 env[1557]: time="2024-02-13T01:35:55.070475396Z" level=info msg="StartContainer for \"59c46cbeb162ae28a7f3a866b709995501a46374085ae3ddaf6b94ed3ee9a98e\" returns successfully" Feb 13 01:35:55.339872 systemd-networkd[1407]: calib538f53c6e7: Gained IPv6LL Feb 13 01:35:56.074024 kubelet[2758]: I0213 01:35:56.073967 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-vkv8f" podStartSLOduration=78.073857445 pod.CreationTimestamp="2024-02-13 01:34:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:35:56.072463899 +0000 UTC m=+90.494493957" watchObservedRunningTime="2024-02-13 01:35:56.073857445 +0000 UTC m=+90.495887498" Feb 13 01:35:56.098000 audit[5264]: NETFILTER_CFG table=filter:123 family=2 entries=6 op=nft_register_rule pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:56.098000 audit[5264]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe01f196a0 a2=0 a3=7ffe01f1968c items=0 ppid=3066 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:56.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:56.099000 audit[5264]: NETFILTER_CFG table=nat:124 family=2 entries=60 op=nft_register_rule pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:56.099000 audit[5264]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffe01f196a0 a2=0 a3=7ffe01f1968c items=0 ppid=3066 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:56.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:56.132000 audit[5290]: NETFILTER_CFG table=filter:125 family=2 entries=6 op=nft_register_rule pid=5290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:56.132000 audit[5290]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd31686220 a2=0 a3=7ffd3168620c items=0 ppid=3066 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:56.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:56.137000 audit[5290]: NETFILTER_CFG table=nat:126 family=2 entries=72 op=nft_register_chain pid=5290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:35:56.137000 audit[5290]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd31686220 a2=0 a3=7ffd3168620c items=0 ppid=3066 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:35:56.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:35:56.428857 systemd-networkd[1407]: calia23bdf13c56: Gained IPv6LL Feb 13 01:35:56.619796 systemd-networkd[1407]: caliee9142c9626: Gained IPv6LL Feb 13 01:35:58.705812 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3908036371.mount: Deactivated successfully. Feb 13 01:36:00.579396 env[1557]: time="2024-02-13T01:36:00.579371849Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:36:00.580109 env[1557]: time="2024-02-13T01:36:00.580084201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:36:00.580892 env[1557]: time="2024-02-13T01:36:00.580862392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:36:00.581832 env[1557]: time="2024-02-13T01:36:00.581796017Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:36:00.582203 env[1557]: time="2024-02-13T01:36:00.582158176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 13 01:36:00.582648 env[1557]: time="2024-02-13T01:36:00.582609716Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 13 01:36:00.583406 env[1557]: time="2024-02-13T01:36:00.583392329Z" level=info msg="CreateContainer within sandbox \"a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 13 01:36:00.588763 env[1557]: time="2024-02-13T01:36:00.588721806Z" level=info msg="CreateContainer within sandbox \"a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"59c7e33243345077192f5c03f04c994c23875cac5363868231a90c6006e717cf\"" Feb 13 01:36:00.589068 env[1557]: time="2024-02-13T01:36:00.589033430Z" level=info msg="StartContainer for \"59c7e33243345077192f5c03f04c994c23875cac5363868231a90c6006e717cf\"" Feb 13 01:36:00.613267 env[1557]: time="2024-02-13T01:36:00.613213824Z" level=info msg="StartContainer for \"59c7e33243345077192f5c03f04c994c23875cac5363868231a90c6006e717cf\" returns successfully" Feb 13 01:36:14.917867 env[1557]: time="2024-02-13T01:36:14.917796189Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:36:14.918574 env[1557]: time="2024-02-13T01:36:14.918530612Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:36:14.919794 env[1557]: time="2024-02-13T01:36:14.919748654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:36:14.921254 env[1557]: time="2024-02-13T01:36:14.921198129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:36:14.921594 env[1557]: time="2024-02-13T01:36:14.921564039Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 13 01:36:14.922105 env[1557]: time="2024-02-13T01:36:14.922091615Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 13 01:36:14.926007 env[1557]: time="2024-02-13T01:36:14.925969362Z" level=info msg="CreateContainer within sandbox \"ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 13 01:36:14.930184 env[1557]: time="2024-02-13T01:36:14.930148822Z" level=info msg="CreateContainer within sandbox \"ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7b54e7da1eae91799c73b9a4280260bbdb6a7e4e3c165c24a98492590feb7496\"" Feb 13 01:36:14.930505 env[1557]: time="2024-02-13T01:36:14.930493819Z" level=info msg="StartContainer for \"7b54e7da1eae91799c73b9a4280260bbdb6a7e4e3c165c24a98492590feb7496\"" Feb 13 01:36:14.963164 env[1557]: time="2024-02-13T01:36:14.963139193Z" level=info msg="StartContainer for \"7b54e7da1eae91799c73b9a4280260bbdb6a7e4e3c165c24a98492590feb7496\" returns successfully" Feb 13 01:36:15.136532 kubelet[2758]: I0213 01:36:15.136474 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-85c58d5987-cq5bq" podStartSLOduration=-9.223371944718393e+09 pod.CreationTimestamp="2024-02-13 01:34:43 +0000 UTC" firstStartedPulling="2024-02-13 01:35:55.070617118 +0000 UTC m=+89.492647104" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:36:15.135036856 +0000 UTC m=+109.557066915" watchObservedRunningTime="2024-02-13 01:36:15.136382297 +0000 UTC m=+109.558412314" Feb 13 01:36:18.352733 kubelet[2758]: I0213 01:36:18.352693 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:36:18.357068 kubelet[2758]: I0213 01:36:18.357033 2758 topology_manager.go:210] "Topology Admit Handler" Feb 13 01:36:18.373000 audit[5470]: NETFILTER_CFG table=filter:127 family=2 entries=7 op=nft_register_rule pid=5470 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:36:18.400280 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 13 01:36:18.400332 kernel: audit: type=1325 audit(1707788178.373:328): table=filter:127 family=2 entries=7 op=nft_register_rule pid=5470 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:36:18.373000 audit[5470]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc07fa7ec0 a2=0 a3=7ffc07fa7eac items=0 ppid=3066 pid=5470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:36:18.522971 kubelet[2758]: I0213 01:36:18.522932 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b66ed067-2989-4060-b0fd-3674f5928d34-calico-apiserver-certs\") pod \"calico-apiserver-5f5669f55d-jlb4b\" (UID: \"b66ed067-2989-4060-b0fd-3674f5928d34\") " pod="calico-apiserver/calico-apiserver-5f5669f55d-jlb4b" Feb 13 01:36:18.522971 kubelet[2758]: I0213 01:36:18.522958 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wg2zg\" (UniqueName: \"kubernetes.io/projected/e261b35f-4de8-4c65-8aab-81325b3b7c9a-kube-api-access-wg2zg\") pod \"calico-apiserver-5f5669f55d-hxtbr\" (UID: \"e261b35f-4de8-4c65-8aab-81325b3b7c9a\") " pod="calico-apiserver/calico-apiserver-5f5669f55d-hxtbr" Feb 13 01:36:18.522971 kubelet[2758]: I0213 01:36:18.522972 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4hpj4\" (UniqueName: \"kubernetes.io/projected/b66ed067-2989-4060-b0fd-3674f5928d34-kube-api-access-4hpj4\") pod \"calico-apiserver-5f5669f55d-jlb4b\" (UID: \"b66ed067-2989-4060-b0fd-3674f5928d34\") " pod="calico-apiserver/calico-apiserver-5f5669f55d-jlb4b" Feb 13 01:36:18.523096 kubelet[2758]: I0213 01:36:18.522987 2758 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e261b35f-4de8-4c65-8aab-81325b3b7c9a-calico-apiserver-certs\") pod \"calico-apiserver-5f5669f55d-hxtbr\" (UID: \"e261b35f-4de8-4c65-8aab-81325b3b7c9a\") " pod="calico-apiserver/calico-apiserver-5f5669f55d-hxtbr" Feb 13 01:36:18.547564 kernel: audit: type=1300 audit(1707788178.373:328): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc07fa7ec0 a2=0 a3=7ffc07fa7eac items=0 ppid=3066 pid=5470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:36:18.547616 kernel: audit: type=1327 audit(1707788178.373:328): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:36:18.373000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:36:18.374000 audit[5470]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=5470 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:36:18.623997 kubelet[2758]: E0213 01:36:18.623957 2758 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 13 01:36:18.624057 kubelet[2758]: E0213 01:36:18.623957 2758 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 13 01:36:18.624057 kubelet[2758]: E0213 01:36:18.623999 2758 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e261b35f-4de8-4c65-8aab-81325b3b7c9a-calico-apiserver-certs podName:e261b35f-4de8-4c65-8aab-81325b3b7c9a nodeName:}" failed. No retries permitted until 2024-02-13 01:36:19.123988016 +0000 UTC m=+113.546017995 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/e261b35f-4de8-4c65-8aab-81325b3b7c9a-calico-apiserver-certs") pod "calico-apiserver-5f5669f55d-hxtbr" (UID: "e261b35f-4de8-4c65-8aab-81325b3b7c9a") : secret "calico-apiserver-certs" not found Feb 13 01:36:18.624057 kubelet[2758]: E0213 01:36:18.624034 2758 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b66ed067-2989-4060-b0fd-3674f5928d34-calico-apiserver-certs podName:b66ed067-2989-4060-b0fd-3674f5928d34 nodeName:}" failed. No retries permitted until 2024-02-13 01:36:19.124024182 +0000 UTC m=+113.546054163 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b66ed067-2989-4060-b0fd-3674f5928d34-calico-apiserver-certs") pod "calico-apiserver-5f5669f55d-jlb4b" (UID: "b66ed067-2989-4060-b0fd-3674f5928d34") : secret "calico-apiserver-certs" not found Feb 13 01:36:18.374000 audit[5470]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc07fa7ec0 a2=0 a3=7ffc07fa7eac items=0 ppid=3066 pid=5470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:36:18.765687 kernel: audit: type=1325 audit(1707788178.374:329): table=nat:128 family=2 entries=78 op=nft_register_rule pid=5470 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:36:18.765743 kernel: audit: type=1300 audit(1707788178.374:329): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc07fa7ec0 a2=0 a3=7ffc07fa7eac items=0 ppid=3066 pid=5470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:36:18.765761 kernel: audit: type=1327 audit(1707788178.374:329): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:36:18.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:36:18.634000 audit[5498]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=5498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:36:18.634000 audit[5498]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe16bd7c60 a2=0 a3=7ffe16bd7c4c items=0 ppid=3066 pid=5498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:36:18.973472 kernel: audit: type=1325 audit(1707788178.634:330): table=filter:129 family=2 entries=8 op=nft_register_rule pid=5498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:36:18.973519 kernel: audit: type=1300 audit(1707788178.634:330): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe16bd7c60 a2=0 a3=7ffe16bd7c4c items=0 ppid=3066 pid=5498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:36:18.973536 kernel: audit: type=1327 audit(1707788178.634:330): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:36:18.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:36:18.822000 audit[5498]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=5498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:36:18.822000 audit[5498]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe16bd7c60 a2=0 a3=7ffe16bd7c4c items=0 ppid=3066 pid=5498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:36:18.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:36:19.089622 kernel: audit: type=1325 audit(1707788178.822:331): table=nat:130 family=2 entries=78 op=nft_register_rule pid=5498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:36:19.126341 kubelet[2758]: E0213 01:36:19.126301 2758 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 13 01:36:19.126341 kubelet[2758]: E0213 01:36:19.126336 2758 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e261b35f-4de8-4c65-8aab-81325b3b7c9a-calico-apiserver-certs podName:e261b35f-4de8-4c65-8aab-81325b3b7c9a nodeName:}" failed. No retries permitted until 2024-02-13 01:36:20.126326807 +0000 UTC m=+114.548356788 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/e261b35f-4de8-4c65-8aab-81325b3b7c9a-calico-apiserver-certs") pod "calico-apiserver-5f5669f55d-hxtbr" (UID: "e261b35f-4de8-4c65-8aab-81325b3b7c9a") : secret "calico-apiserver-certs" not found Feb 13 01:36:19.126441 kubelet[2758]: E0213 01:36:19.126302 2758 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 13 01:36:19.126441 kubelet[2758]: E0213 01:36:19.126394 2758 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b66ed067-2989-4060-b0fd-3674f5928d34-calico-apiserver-certs podName:b66ed067-2989-4060-b0fd-3674f5928d34 nodeName:}" failed. No retries permitted until 2024-02-13 01:36:20.126386985 +0000 UTC m=+114.548416963 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b66ed067-2989-4060-b0fd-3674f5928d34-calico-apiserver-certs") pod "calico-apiserver-5f5669f55d-jlb4b" (UID: "b66ed067-2989-4060-b0fd-3674f5928d34") : secret "calico-apiserver-certs" not found Feb 13 01:36:20.157300 env[1557]: time="2024-02-13T01:36:20.157214672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f5669f55d-jlb4b,Uid:b66ed067-2989-4060-b0fd-3674f5928d34,Namespace:calico-apiserver,Attempt:0,}" Feb 13 01:36:20.164078 env[1557]: time="2024-02-13T01:36:20.164006127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f5669f55d-hxtbr,Uid:e261b35f-4de8-4c65-8aab-81325b3b7c9a,Namespace:calico-apiserver,Attempt:0,}" Feb 13 01:36:20.241803 systemd-networkd[1407]: cali06c38a011c6: Link UP Feb 13 01:36:20.268667 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 01:36:20.268736 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali06c38a011c6: link becomes ready Feb 13 01:36:20.296214 systemd-networkd[1407]: cali06c38a011c6: Gained carrier Feb 13 01:36:20.296774 systemd-networkd[1407]: cali2be5ceac5b7: Link UP Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.200 [INFO][5513] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0 calico-apiserver-5f5669f55d- calico-apiserver e261b35f-4de8-4c65-8aab-81325b3b7c9a 923 0 2024-02-13 01:36:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f5669f55d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-ab9b2e6956 calico-apiserver-5f5669f55d-hxtbr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali06c38a011c6 [] []}} ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-hxtbr" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.200 [INFO][5513] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-hxtbr" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.215 [INFO][5549] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" HandleID="k8s-pod-network.fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.222 [INFO][5549] ipam_plugin.go 268: Auto assigning IP ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" HandleID="k8s-pod-network.fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00022d350), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-ab9b2e6956", "pod":"calico-apiserver-5f5669f55d-hxtbr", "timestamp":"2024-02-13 01:36:20.215448815 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ab9b2e6956", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.222 [INFO][5549] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.222 [INFO][5549] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.222 [INFO][5549] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ab9b2e6956' Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.223 [INFO][5549] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.226 [INFO][5549] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.229 [INFO][5549] ipam.go 489: Trying affinity for 192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.231 [INFO][5549] ipam.go 155: Attempting to load block cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.232 [INFO][5549] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.232 [INFO][5549] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.67.0/26 handle="k8s-pod-network.fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.234 [INFO][5549] ipam.go 1682: Creating new handle: k8s-pod-network.fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.236 [INFO][5549] ipam.go 1203: Writing block in order to claim IPs block=192.168.67.0/26 handle="k8s-pod-network.fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.239 [INFO][5549] ipam.go 1216: Successfully claimed IPs: [192.168.67.5/26] block=192.168.67.0/26 handle="k8s-pod-network.fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.239 [INFO][5549] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.67.5/26] handle="k8s-pod-network.fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.239 [INFO][5549] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:36:20.302149 env[1557]: 2024-02-13 01:36:20.239 [INFO][5549] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.67.5/26] IPv6=[] ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" HandleID="k8s-pod-network.fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0" Feb 13 01:36:20.302699 env[1557]: 2024-02-13 01:36:20.240 [INFO][5513] k8s.go 385: Populated endpoint ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-hxtbr" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0", GenerateName:"calico-apiserver-5f5669f55d-", Namespace:"calico-apiserver", SelfLink:"", UID:"e261b35f-4de8-4c65-8aab-81325b3b7c9a", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 36, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f5669f55d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"", Pod:"calico-apiserver-5f5669f55d-hxtbr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali06c38a011c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:20.302699 env[1557]: 2024-02-13 01:36:20.240 [INFO][5513] k8s.go 386: Calico CNI using IPs: [192.168.67.5/32] ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-hxtbr" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0" Feb 13 01:36:20.302699 env[1557]: 2024-02-13 01:36:20.240 [INFO][5513] dataplane_linux.go 68: Setting the host side veth name to cali06c38a011c6 ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-hxtbr" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0" Feb 13 01:36:20.302699 env[1557]: 2024-02-13 01:36:20.296 [INFO][5513] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-hxtbr" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0" Feb 13 01:36:20.302699 env[1557]: 2024-02-13 01:36:20.296 [INFO][5513] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-hxtbr" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0", GenerateName:"calico-apiserver-5f5669f55d-", Namespace:"calico-apiserver", SelfLink:"", UID:"e261b35f-4de8-4c65-8aab-81325b3b7c9a", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 36, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f5669f55d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c", Pod:"calico-apiserver-5f5669f55d-hxtbr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali06c38a011c6", MAC:"76:bd:b9:e4:a0:1d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:20.302699 env[1557]: 2024-02-13 01:36:20.300 [INFO][5513] k8s.go 491: Wrote updated endpoint to datastore ContainerID="fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-hxtbr" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--hxtbr-eth0" Feb 13 01:36:20.307963 env[1557]: time="2024-02-13T01:36:20.307933165Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:36:20.307963 env[1557]: time="2024-02-13T01:36:20.307954590Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:36:20.307963 env[1557]: time="2024-02-13T01:36:20.307961402Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:36:20.308098 env[1557]: time="2024-02-13T01:36:20.308025133Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c pid=5609 runtime=io.containerd.runc.v2 Feb 13 01:36:20.308000 audit[5621]: NETFILTER_CFG table=filter:131 family=2 entries=59 op=nft_register_chain pid=5621 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:36:20.308000 audit[5621]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffe002e2c60 a2=0 a3=7ffe002e2c4c items=0 ppid=4255 pid=5621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:36:20.308000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:36:20.324122 systemd-networkd[1407]: cali2be5ceac5b7: Gained carrier Feb 13 01:36:20.324622 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2be5ceac5b7: link becomes ready Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.199 [INFO][5502] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0 calico-apiserver-5f5669f55d- calico-apiserver b66ed067-2989-4060-b0fd-3674f5928d34 921 0 2024-02-13 01:36:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f5669f55d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-ab9b2e6956 calico-apiserver-5f5669f55d-jlb4b eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2be5ceac5b7 [] []}} ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-jlb4b" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.199 [INFO][5502] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-jlb4b" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.215 [INFO][5548] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" HandleID="k8s-pod-network.997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.222 [INFO][5548] ipam_plugin.go 268: Auto assigning IP ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" HandleID="k8s-pod-network.997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000511c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-ab9b2e6956", "pod":"calico-apiserver-5f5669f55d-jlb4b", "timestamp":"2024-02-13 01:36:20.215428632 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ab9b2e6956", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.222 [INFO][5548] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.239 [INFO][5548] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.239 [INFO][5548] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ab9b2e6956' Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.241 [INFO][5548] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.244 [INFO][5548] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.247 [INFO][5548] ipam.go 489: Trying affinity for 192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.249 [INFO][5548] ipam.go 155: Attempting to load block cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.250 [INFO][5548] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.67.0/26 host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.250 [INFO][5548] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.67.0/26 handle="k8s-pod-network.997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.252 [INFO][5548] ipam.go 1682: Creating new handle: k8s-pod-network.997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.254 [INFO][5548] ipam.go 1203: Writing block in order to claim IPs block=192.168.67.0/26 handle="k8s-pod-network.997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.259 [INFO][5548] ipam.go 1216: Successfully claimed IPs: [192.168.67.6/26] block=192.168.67.0/26 handle="k8s-pod-network.997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.259 [INFO][5548] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.67.6/26] handle="k8s-pod-network.997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" host="ci-3510.3.2-a-ab9b2e6956" Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.259 [INFO][5548] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:36:20.330776 env[1557]: 2024-02-13 01:36:20.259 [INFO][5548] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.67.6/26] IPv6=[] ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" HandleID="k8s-pod-network.997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0" Feb 13 01:36:20.331218 env[1557]: 2024-02-13 01:36:20.260 [INFO][5502] k8s.go 385: Populated endpoint ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-jlb4b" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0", GenerateName:"calico-apiserver-5f5669f55d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b66ed067-2989-4060-b0fd-3674f5928d34", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 36, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f5669f55d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"", Pod:"calico-apiserver-5f5669f55d-jlb4b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2be5ceac5b7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:20.331218 env[1557]: 2024-02-13 01:36:20.260 [INFO][5502] k8s.go 386: Calico CNI using IPs: [192.168.67.6/32] ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-jlb4b" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0" Feb 13 01:36:20.331218 env[1557]: 2024-02-13 01:36:20.260 [INFO][5502] dataplane_linux.go 68: Setting the host side veth name to cali2be5ceac5b7 ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-jlb4b" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0" Feb 13 01:36:20.331218 env[1557]: 2024-02-13 01:36:20.324 [INFO][5502] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-jlb4b" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0" Feb 13 01:36:20.331218 env[1557]: 2024-02-13 01:36:20.324 [INFO][5502] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-jlb4b" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0", GenerateName:"calico-apiserver-5f5669f55d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b66ed067-2989-4060-b0fd-3674f5928d34", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 36, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f5669f55d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d", Pod:"calico-apiserver-5f5669f55d-jlb4b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2be5ceac5b7", MAC:"8a:f0:29:91:32:ee", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:20.331218 env[1557]: 2024-02-13 01:36:20.329 [INFO][5502] k8s.go 491: Wrote updated endpoint to datastore ContainerID="997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d" Namespace="calico-apiserver" Pod="calico-apiserver-5f5669f55d-jlb4b" WorkloadEndpoint="ci--3510.3.2--a--ab9b2e6956-k8s-calico--apiserver--5f5669f55d--jlb4b-eth0" Feb 13 01:36:20.335914 env[1557]: time="2024-02-13T01:36:20.335847110Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 01:36:20.335914 env[1557]: time="2024-02-13T01:36:20.335867119Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 01:36:20.335914 env[1557]: time="2024-02-13T01:36:20.335873952Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 01:36:20.336071 env[1557]: time="2024-02-13T01:36:20.335974808Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d pid=5658 runtime=io.containerd.runc.v2 Feb 13 01:36:20.334000 audit[5659]: NETFILTER_CFG table=filter:132 family=2 entries=50 op=nft_register_chain pid=5659 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 01:36:20.334000 audit[5659]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7fff6f9c9f60 a2=0 a3=7fff6f9c9f4c items=0 ppid=4255 pid=5659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:36:20.334000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 01:36:20.347474 env[1557]: time="2024-02-13T01:36:20.347454007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f5669f55d-hxtbr,Uid:e261b35f-4de8-4c65-8aab-81325b3b7c9a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c\"" Feb 13 01:36:20.363576 env[1557]: time="2024-02-13T01:36:20.363549636Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f5669f55d-jlb4b,Uid:b66ed067-2989-4060-b0fd-3674f5928d34,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d\"" Feb 13 01:36:21.516913 systemd-networkd[1407]: cali06c38a011c6: Gained IPv6LL Feb 13 01:36:22.027889 systemd-networkd[1407]: cali2be5ceac5b7: Gained IPv6LL Feb 13 01:36:25.743708 env[1557]: time="2024-02-13T01:36:25.743636271Z" level=info msg="StopPodSandbox for \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\"" Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.763 [WARNING][5715] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6a66657b-7973-4ebf-a8cb-c6cb52a5c528", ResourceVersion:"789", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040", Pod:"coredns-787d4945fb-8bcp4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7acfb59803", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.764 [INFO][5715] k8s.go 578: Cleaning up netns ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.764 [INFO][5715] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" iface="eth0" netns="" Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.764 [INFO][5715] k8s.go 585: Releasing IP address(es) ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.764 [INFO][5715] utils.go 188: Calico CNI releasing IP address ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.776 [INFO][5732] ipam_plugin.go 415: Releasing address using handleID ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" HandleID="k8s-pod-network.1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.776 [INFO][5732] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.776 [INFO][5732] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.782 [WARNING][5732] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" HandleID="k8s-pod-network.1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.782 [INFO][5732] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" HandleID="k8s-pod-network.1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.784 [INFO][5732] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:36:25.786038 env[1557]: 2024-02-13 01:36:25.785 [INFO][5715] k8s.go 591: Teardown processing complete. ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:36:25.786706 env[1557]: time="2024-02-13T01:36:25.786064183Z" level=info msg="TearDown network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\" successfully" Feb 13 01:36:25.786706 env[1557]: time="2024-02-13T01:36:25.786098583Z" level=info msg="StopPodSandbox for \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\" returns successfully" Feb 13 01:36:25.786706 env[1557]: time="2024-02-13T01:36:25.786541047Z" level=info msg="RemovePodSandbox for \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\"" Feb 13 01:36:25.786706 env[1557]: time="2024-02-13T01:36:25.786575041Z" level=info msg="Forcibly stopping sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\"" Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.823 [WARNING][5760] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6a66657b-7973-4ebf-a8cb-c6cb52a5c528", ResourceVersion:"789", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"b4e124000d70c05a319ca2a647bf966a768f54926d048bc32aa4bb6564dba040", Pod:"coredns-787d4945fb-8bcp4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7acfb59803", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.823 [INFO][5760] k8s.go 578: Cleaning up netns ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.823 [INFO][5760] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" iface="eth0" netns="" Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.823 [INFO][5760] k8s.go 585: Releasing IP address(es) ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.823 [INFO][5760] utils.go 188: Calico CNI releasing IP address ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.843 [INFO][5779] ipam_plugin.go 415: Releasing address using handleID ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" HandleID="k8s-pod-network.1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.844 [INFO][5779] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.844 [INFO][5779] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.852 [WARNING][5779] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" HandleID="k8s-pod-network.1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.852 [INFO][5779] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" HandleID="k8s-pod-network.1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--8bcp4-eth0" Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.853 [INFO][5779] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:36:25.856171 env[1557]: 2024-02-13 01:36:25.854 [INFO][5760] k8s.go 591: Teardown processing complete. ContainerID="1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2" Feb 13 01:36:25.857223 env[1557]: time="2024-02-13T01:36:25.856203154Z" level=info msg="TearDown network for sandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\" successfully" Feb 13 01:36:25.859030 env[1557]: time="2024-02-13T01:36:25.858998390Z" level=info msg="RemovePodSandbox \"1b408742b32679c2cfa83dfdb40d6840a81825b713e4fdb8b7eb48bd28897ba2\" returns successfully" Feb 13 01:36:25.859524 env[1557]: time="2024-02-13T01:36:25.859492134Z" level=info msg="StopPodSandbox for \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\"" Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.898 [WARNING][5808] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0", GenerateName:"calico-kube-controllers-85c58d5987-", Namespace:"calico-system", SelfLink:"", UID:"01f5d4d2-83e3-48c7-87ce-959645d54c3e", ResourceVersion:"870", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85c58d5987", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29", Pod:"calico-kube-controllers-85c58d5987-cq5bq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.67.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia23bdf13c56", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.899 [INFO][5808] k8s.go 578: Cleaning up netns ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.899 [INFO][5808] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" iface="eth0" netns="" Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.899 [INFO][5808] k8s.go 585: Releasing IP address(es) ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.899 [INFO][5808] utils.go 188: Calico CNI releasing IP address ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.919 [INFO][5828] ipam_plugin.go 415: Releasing address using handleID ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" HandleID="k8s-pod-network.b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.919 [INFO][5828] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.919 [INFO][5828] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.927 [WARNING][5828] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" HandleID="k8s-pod-network.b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.927 [INFO][5828] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" HandleID="k8s-pod-network.b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.929 [INFO][5828] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:36:25.931698 env[1557]: 2024-02-13 01:36:25.930 [INFO][5808] k8s.go 591: Teardown processing complete. ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:36:25.932452 env[1557]: time="2024-02-13T01:36:25.931712605Z" level=info msg="TearDown network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\" successfully" Feb 13 01:36:25.932452 env[1557]: time="2024-02-13T01:36:25.931754130Z" level=info msg="StopPodSandbox for \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\" returns successfully" Feb 13 01:36:25.932452 env[1557]: time="2024-02-13T01:36:25.932156800Z" level=info msg="RemovePodSandbox for \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\"" Feb 13 01:36:25.932452 env[1557]: time="2024-02-13T01:36:25.932197064Z" level=info msg="Forcibly stopping sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\"" Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:25.969 [WARNING][5856] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0", GenerateName:"calico-kube-controllers-85c58d5987-", Namespace:"calico-system", SelfLink:"", UID:"01f5d4d2-83e3-48c7-87ce-959645d54c3e", ResourceVersion:"870", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85c58d5987", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"ff13f23a4626f73b95f05229cd6f0c97e09ee9306adfdcc569763cf2a4d7eb29", Pod:"calico-kube-controllers-85c58d5987-cq5bq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.67.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia23bdf13c56", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:25.970 [INFO][5856] k8s.go 578: Cleaning up netns ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:25.970 [INFO][5856] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" iface="eth0" netns="" Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:25.970 [INFO][5856] k8s.go 585: Releasing IP address(es) ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:25.970 [INFO][5856] utils.go 188: Calico CNI releasing IP address ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:25.992 [INFO][5874] ipam_plugin.go 415: Releasing address using handleID ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" HandleID="k8s-pod-network.b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:25.992 [INFO][5874] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:25.992 [INFO][5874] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:26.000 [WARNING][5874] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" HandleID="k8s-pod-network.b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:26.000 [INFO][5874] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" HandleID="k8s-pod-network.b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-calico--kube--controllers--85c58d5987--cq5bq-eth0" Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:26.002 [INFO][5874] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:36:26.005011 env[1557]: 2024-02-13 01:36:26.003 [INFO][5856] k8s.go 591: Teardown processing complete. ContainerID="b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89" Feb 13 01:36:26.006043 env[1557]: time="2024-02-13T01:36:26.004988992Z" level=info msg="TearDown network for sandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\" successfully" Feb 13 01:36:26.007845 env[1557]: time="2024-02-13T01:36:26.007814377Z" level=info msg="RemovePodSandbox \"b37688b57301dbd2333b61183df2c0b67fcebda713e7052ca3fab1b3832d8a89\" returns successfully" Feb 13 01:36:26.008332 env[1557]: time="2024-02-13T01:36:26.008279880Z" level=info msg="StopPodSandbox for \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\"" Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.047 [WARNING][5905] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"2cc0688b-bce9-43e9-8359-74570cd615a9", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d", Pod:"coredns-787d4945fb-vkv8f", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee9142c9626", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.047 [INFO][5905] k8s.go 578: Cleaning up netns ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.047 [INFO][5905] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" iface="eth0" netns="" Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.047 [INFO][5905] k8s.go 585: Releasing IP address(es) ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.047 [INFO][5905] utils.go 188: Calico CNI releasing IP address ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.071 [INFO][5922] ipam_plugin.go 415: Releasing address using handleID ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" HandleID="k8s-pod-network.4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.071 [INFO][5922] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.071 [INFO][5922] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.079 [WARNING][5922] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" HandleID="k8s-pod-network.4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.079 [INFO][5922] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" HandleID="k8s-pod-network.4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.081 [INFO][5922] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:36:26.084117 env[1557]: 2024-02-13 01:36:26.082 [INFO][5905] k8s.go 591: Teardown processing complete. ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:36:26.084925 env[1557]: time="2024-02-13T01:36:26.084156086Z" level=info msg="TearDown network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\" successfully" Feb 13 01:36:26.084925 env[1557]: time="2024-02-13T01:36:26.084199434Z" level=info msg="StopPodSandbox for \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\" returns successfully" Feb 13 01:36:26.084925 env[1557]: time="2024-02-13T01:36:26.084588159Z" level=info msg="RemovePodSandbox for \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\"" Feb 13 01:36:26.084925 env[1557]: time="2024-02-13T01:36:26.084632428Z" level=info msg="Forcibly stopping sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\"" Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.121 [WARNING][5954] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"2cc0688b-bce9-43e9-8359-74570cd615a9", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"eedf89e78b548f246fff3a1e7280e109619d02f3194d9b98103b23aa40d8261d", Pod:"coredns-787d4945fb-vkv8f", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee9142c9626", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.122 [INFO][5954] k8s.go 578: Cleaning up netns ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.122 [INFO][5954] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" iface="eth0" netns="" Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.122 [INFO][5954] k8s.go 585: Releasing IP address(es) ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.122 [INFO][5954] utils.go 188: Calico CNI releasing IP address ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.143 [INFO][5973] ipam_plugin.go 415: Releasing address using handleID ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" HandleID="k8s-pod-network.4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.143 [INFO][5973] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.143 [INFO][5973] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.150 [WARNING][5973] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" HandleID="k8s-pod-network.4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.150 [INFO][5973] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" HandleID="k8s-pod-network.4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-coredns--787d4945fb--vkv8f-eth0" Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.151 [INFO][5973] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:36:26.154118 env[1557]: 2024-02-13 01:36:26.153 [INFO][5954] k8s.go 591: Teardown processing complete. ContainerID="4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76" Feb 13 01:36:26.154849 env[1557]: time="2024-02-13T01:36:26.154143799Z" level=info msg="TearDown network for sandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\" successfully" Feb 13 01:36:26.156409 env[1557]: time="2024-02-13T01:36:26.156365936Z" level=info msg="RemovePodSandbox \"4c61bb59d720ea9f713639cc0487bf6af99e90b413f1bbb0a1311a5b73886b76\" returns successfully" Feb 13 01:36:26.156589 env[1557]: time="2024-02-13T01:36:26.156568343Z" level=info msg="StopPodSandbox for \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\"" Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.188 [WARNING][6005] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2afb53c-b33f-498f-9383-018830c7932b", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015", Pod:"csi-node-driver-6fhg4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib538f53c6e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.189 [INFO][6005] k8s.go 578: Cleaning up netns ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.189 [INFO][6005] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" iface="eth0" netns="" Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.189 [INFO][6005] k8s.go 585: Releasing IP address(es) ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.189 [INFO][6005] utils.go 188: Calico CNI releasing IP address ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.206 [INFO][6038] ipam_plugin.go 415: Releasing address using handleID ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" HandleID="k8s-pod-network.3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.206 [INFO][6038] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.206 [INFO][6038] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.212 [WARNING][6038] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" HandleID="k8s-pod-network.3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.212 [INFO][6038] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" HandleID="k8s-pod-network.3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.213 [INFO][6038] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:36:26.215712 env[1557]: 2024-02-13 01:36:26.214 [INFO][6005] k8s.go 591: Teardown processing complete. ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:36:26.216171 env[1557]: time="2024-02-13T01:36:26.215704778Z" level=info msg="TearDown network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\" successfully" Feb 13 01:36:26.216171 env[1557]: time="2024-02-13T01:36:26.215730437Z" level=info msg="StopPodSandbox for \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\" returns successfully" Feb 13 01:36:26.216171 env[1557]: time="2024-02-13T01:36:26.216062816Z" level=info msg="RemovePodSandbox for \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\"" Feb 13 01:36:26.216171 env[1557]: time="2024-02-13T01:36:26.216088725Z" level=info msg="Forcibly stopping sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\"" Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.239 [WARNING][6086] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2afb53c-b33f-498f-9383-018830c7932b", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 1, 34, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ab9b2e6956", ContainerID:"a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015", Pod:"csi-node-driver-6fhg4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib538f53c6e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.240 [INFO][6086] k8s.go 578: Cleaning up netns ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.240 [INFO][6086] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" iface="eth0" netns="" Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.240 [INFO][6086] k8s.go 585: Releasing IP address(es) ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.240 [INFO][6086] utils.go 188: Calico CNI releasing IP address ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.253 [INFO][6103] ipam_plugin.go 415: Releasing address using handleID ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" HandleID="k8s-pod-network.3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.253 [INFO][6103] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.254 [INFO][6103] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.259 [WARNING][6103] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" HandleID="k8s-pod-network.3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.259 [INFO][6103] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" HandleID="k8s-pod-network.3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Workload="ci--3510.3.2--a--ab9b2e6956-k8s-csi--node--driver--6fhg4-eth0" Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.261 [INFO][6103] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 01:36:26.262755 env[1557]: 2024-02-13 01:36:26.261 [INFO][6086] k8s.go 591: Teardown processing complete. ContainerID="3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee" Feb 13 01:36:26.262755 env[1557]: time="2024-02-13T01:36:26.262731961Z" level=info msg="TearDown network for sandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\" successfully" Feb 13 01:36:26.264500 env[1557]: time="2024-02-13T01:36:26.264482123Z" level=info msg="RemovePodSandbox \"3314c189f0955e0e4d84662be1c923e584fb017134bc21edb38862b0d8b75dee\" returns successfully" Feb 13 01:36:55.054073 sshd[3522]: Timeout before authentication for 154.8.204.139 port 48514 Feb 13 01:36:55.055606 systemd[1]: sshd@9-147.75.90.7:22-154.8.204.139:48514.service: Deactivated successfully. Feb 13 01:36:55.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.90.7:22-154.8.204.139:48514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:55.081523 kernel: kauditd_printk_skb: 8 callbacks suppressed Feb 13 01:36:55.081562 kernel: audit: type=1131 audit(1707788215.055:334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.90.7:22-154.8.204.139:48514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:59.936333 systemd[1]: Started sshd@13-147.75.90.7:22-124.221.203.42:35764.service. Feb 13 01:36:59.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.7:22-124.221.203.42:35764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:59.986264 systemd[1]: Started sshd@14-147.75.90.7:22-116.162.149.176:55348.service. Feb 13 01:36:59.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.7:22-116.162.149.176:55348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:00.106393 kernel: audit: type=1130 audit(1707788219.934:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.7:22-124.221.203.42:35764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:00.106428 kernel: audit: type=1130 audit(1707788219.984:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.7:22-116.162.149.176:55348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:01.546850 sshd[6212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.203.42 user=root Feb 13 01:37:01.545000 audit[6212]: USER_AUTH pid=6212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.203.42 addr=124.221.203.42 terminal=ssh res=failed' Feb 13 01:37:01.632818 kernel: audit: type=1100 audit(1707788221.545:337): pid=6212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.203.42 addr=124.221.203.42 terminal=ssh res=failed' Feb 13 01:37:03.304849 sshd[6212]: Failed password for root from 124.221.203.42 port 35764 ssh2 Feb 13 01:37:04.991380 sshd[6212]: Received disconnect from 124.221.203.42 port 35764:11: Bye Bye [preauth] Feb 13 01:37:04.991380 sshd[6212]: Disconnected from authenticating user root 124.221.203.42 port 35764 [preauth] Feb 13 01:37:04.993917 systemd[1]: sshd@13-147.75.90.7:22-124.221.203.42:35764.service: Deactivated successfully. Feb 13 01:37:04.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.7:22-124.221.203.42:35764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:05.080701 kernel: audit: type=1131 audit(1707788224.993:338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.7:22-124.221.203.42:35764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:16.678827 systemd[1]: Started sshd@15-147.75.90.7:22-14.63.196.175:45000.service. Feb 13 01:37:16.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.7:22-14.63.196.175:45000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:16.766815 kernel: audit: type=1130 audit(1707788236.678:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.7:22-14.63.196.175:45000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:17.442465 sshd[6228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.196.175 user=root Feb 13 01:37:17.442000 audit[6228]: USER_AUTH pid=6228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 01:37:17.530813 kernel: audit: type=1100 audit(1707788237.442:340): pid=6228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 01:37:19.396811 sshd[6228]: Failed password for root from 14.63.196.175 port 45000 ssh2 Feb 13 01:37:20.866300 sshd[6228]: Received disconnect from 14.63.196.175 port 45000:11: Bye Bye [preauth] Feb 13 01:37:20.866300 sshd[6228]: Disconnected from authenticating user root 14.63.196.175 port 45000 [preauth] Feb 13 01:37:20.868953 systemd[1]: sshd@15-147.75.90.7:22-14.63.196.175:45000.service: Deactivated successfully. Feb 13 01:37:20.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.7:22-14.63.196.175:45000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:20.958621 kernel: audit: type=1131 audit(1707788240.869:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.7:22-14.63.196.175:45000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:36.357735 sshd[4004]: Timeout before authentication for 43.139.1.143 port 57164 Feb 13 01:37:36.359486 systemd[1]: sshd@12-147.75.90.7:22-43.139.1.143:57164.service: Deactivated successfully. Feb 13 01:37:36.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.7:22-43.139.1.143:57164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:36.449703 kernel: audit: type=1131 audit(1707788256.359:342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.7:22-43.139.1.143:57164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:40.287239 systemd[1]: Started sshd@16-147.75.90.7:22-141.98.11.90:40172.service. Feb 13 01:38:40.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.7:22-141.98.11.90:40172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:40.376725 kernel: audit: type=1130 audit(1707788320.286:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.7:22-141.98.11.90:40172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:41.696343 sshd[6458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.90 user=root Feb 13 01:38:41.696000 audit[6458]: USER_AUTH pid=6458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.90 addr=141.98.11.90 terminal=ssh res=failed' Feb 13 01:38:41.784661 kernel: audit: type=1100 audit(1707788321.696:344): pid=6458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.90 addr=141.98.11.90 terminal=ssh res=failed' Feb 13 01:38:44.181839 sshd[6458]: Failed password for root from 141.98.11.90 port 40172 ssh2 Feb 13 01:38:45.171925 sshd[6458]: Connection closed by authenticating user root 141.98.11.90 port 40172 [preauth] Feb 13 01:38:45.174363 systemd[1]: sshd@16-147.75.90.7:22-141.98.11.90:40172.service: Deactivated successfully. Feb 13 01:38:45.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.7:22-141.98.11.90:40172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:45.264825 kernel: audit: type=1131 audit(1707788325.174:345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.7:22-141.98.11.90:40172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:59.991158 sshd[6213]: Timeout before authentication for 116.162.149.176 port 55348 Feb 13 01:38:59.992691 systemd[1]: sshd@14-147.75.90.7:22-116.162.149.176:55348.service: Deactivated successfully. Feb 13 01:38:59.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.7:22-116.162.149.176:55348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:00.082624 kernel: audit: type=1131 audit(1707788339.991:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.7:22-116.162.149.176:55348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:27.545604 systemd[1]: Started sshd@17-147.75.90.7:22-124.221.203.42:53822.service. Feb 13 01:39:27.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.7:22-124.221.203.42:53822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:27.635703 kernel: audit: type=1130 audit(1707788367.544:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.7:22-124.221.203.42:53822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:29.113208 sshd[6582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.203.42 user=root Feb 13 01:39:29.111000 audit[6582]: USER_AUTH pid=6582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.203.42 addr=124.221.203.42 terminal=ssh res=failed' Feb 13 01:39:29.202814 kernel: audit: type=1100 audit(1707788369.111:348): pid=6582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.203.42 addr=124.221.203.42 terminal=ssh res=failed' Feb 13 01:39:31.854978 sshd[6582]: Failed password for root from 124.221.203.42 port 53822 ssh2 Feb 13 01:39:32.535697 sshd[6582]: Received disconnect from 124.221.203.42 port 53822:11: Bye Bye [preauth] Feb 13 01:39:32.535697 sshd[6582]: Disconnected from authenticating user root 124.221.203.42 port 53822 [preauth] Feb 13 01:39:32.538516 systemd[1]: sshd@17-147.75.90.7:22-124.221.203.42:53822.service: Deactivated successfully. Feb 13 01:39:32.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.7:22-124.221.203.42:53822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:32.631712 kernel: audit: type=1131 audit(1707788372.538:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.7:22-124.221.203.42:53822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:34.030046 env[1557]: time="2024-02-13T01:39:34.029994332Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:34.030756 env[1557]: time="2024-02-13T01:39:34.030721877Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:34.031503 env[1557]: time="2024-02-13T01:39:34.031471040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:34.032100 env[1557]: time="2024-02-13T01:39:34.032054059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:34.032686 env[1557]: time="2024-02-13T01:39:34.032623977Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 13 01:39:34.032995 env[1557]: time="2024-02-13T01:39:34.032953459Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 13 01:39:34.033610 env[1557]: time="2024-02-13T01:39:34.033596849Z" level=info msg="CreateContainer within sandbox \"a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 13 01:39:34.038060 env[1557]: time="2024-02-13T01:39:34.038016032Z" level=info msg="CreateContainer within sandbox \"a25365fbc6b45f91d24eacd6c0e24db3b8b95b10b9498a8d11e9d997a5f9b015\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"eca31f10f690e88a62af22cbbedb4c1623999a6f2db9b59ba7436fe47097e4c8\"" Feb 13 01:39:34.038330 env[1557]: time="2024-02-13T01:39:34.038287545Z" level=info msg="StartContainer for \"eca31f10f690e88a62af22cbbedb4c1623999a6f2db9b59ba7436fe47097e4c8\"" Feb 13 01:39:34.063316 env[1557]: time="2024-02-13T01:39:34.063264430Z" level=info msg="StartContainer for \"eca31f10f690e88a62af22cbbedb4c1623999a6f2db9b59ba7436fe47097e4c8\" returns successfully" Feb 13 01:39:34.753594 kubelet[2758]: I0213 01:39:34.753499 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-6fhg4" podStartSLOduration=-9.223371745101383e+09 pod.CreationTimestamp="2024-02-13 01:34:43 +0000 UTC" firstStartedPulling="2024-02-13 01:35:54.141145624 +0000 UTC m=+88.563175603" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:39:34.751727845 +0000 UTC m=+309.173757896" watchObservedRunningTime="2024-02-13 01:39:34.753392909 +0000 UTC m=+309.175422941" Feb 13 01:39:34.962704 kubelet[2758]: I0213 01:39:34.962655 2758 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 13 01:39:34.963003 kubelet[2758]: I0213 01:39:34.962729 2758 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 13 01:39:44.029017 env[1557]: time="2024-02-13T01:39:44.028913807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:44.030326 env[1557]: time="2024-02-13T01:39:44.030297594Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:44.032819 env[1557]: time="2024-02-13T01:39:44.032746228Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:44.035488 env[1557]: time="2024-02-13T01:39:44.035423318Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:44.036847 env[1557]: time="2024-02-13T01:39:44.036777925Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 13 01:39:44.037607 env[1557]: time="2024-02-13T01:39:44.037562255Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 13 01:39:44.039387 env[1557]: time="2024-02-13T01:39:44.039344100Z" level=info msg="CreateContainer within sandbox \"fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 13 01:39:44.045877 env[1557]: time="2024-02-13T01:39:44.045801869Z" level=info msg="CreateContainer within sandbox \"fa0395a45230463f9c6ab3a9c197f8f8272d52c09b5533caa5b1a44cdd217f0c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6c1f705a0c2c2c75de0a80b237d42601ded238614fdbaca761fb3166902f8254\"" Feb 13 01:39:44.046232 env[1557]: time="2024-02-13T01:39:44.046198515Z" level=info msg="StartContainer for \"6c1f705a0c2c2c75de0a80b237d42601ded238614fdbaca761fb3166902f8254\"" Feb 13 01:39:44.079704 env[1557]: time="2024-02-13T01:39:44.079681151Z" level=info msg="StartContainer for \"6c1f705a0c2c2c75de0a80b237d42601ded238614fdbaca761fb3166902f8254\" returns successfully" Feb 13 01:39:44.419441 env[1557]: time="2024-02-13T01:39:44.419195616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:44.421867 env[1557]: time="2024-02-13T01:39:44.421796769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:44.426353 env[1557]: time="2024-02-13T01:39:44.426289788Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:44.431106 env[1557]: time="2024-02-13T01:39:44.431038506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 01:39:44.433274 env[1557]: time="2024-02-13T01:39:44.433171282Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 13 01:39:44.437441 env[1557]: time="2024-02-13T01:39:44.437350426Z" level=info msg="CreateContainer within sandbox \"997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 13 01:39:44.448502 env[1557]: time="2024-02-13T01:39:44.448420674Z" level=info msg="CreateContainer within sandbox \"997ac9d03dbb5c42e0ee91314fc9542ee09775f1e954910fe7c9d61ac786569d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"073ec00094353f70a8baa6271602811b612dc51d606731d315da3b1f2445b9a3\"" Feb 13 01:39:44.449316 env[1557]: time="2024-02-13T01:39:44.449233837Z" level=info msg="StartContainer for \"073ec00094353f70a8baa6271602811b612dc51d606731d315da3b1f2445b9a3\"" Feb 13 01:39:44.553640 env[1557]: time="2024-02-13T01:39:44.553576328Z" level=info msg="StartContainer for \"073ec00094353f70a8baa6271602811b612dc51d606731d315da3b1f2445b9a3\" returns successfully" Feb 13 01:39:44.763396 kubelet[2758]: I0213 01:39:44.763375 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5f5669f55d-hxtbr" podStartSLOduration=-9.223371830091425e+09 pod.CreationTimestamp="2024-02-13 01:36:18 +0000 UTC" firstStartedPulling="2024-02-13 01:36:20.347979078 +0000 UTC m=+114.770009059" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:39:44.762969839 +0000 UTC m=+319.184999820" watchObservedRunningTime="2024-02-13 01:39:44.763350236 +0000 UTC m=+319.185380214" Feb 13 01:39:44.770265 kubelet[2758]: I0213 01:39:44.770244 2758 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5f5669f55d-jlb4b" podStartSLOduration=-9.223371830084562e+09 pod.CreationTimestamp="2024-02-13 01:36:18 +0000 UTC" firstStartedPulling="2024-02-13 01:36:20.364085271 +0000 UTC m=+114.786115257" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 01:39:44.768018308 +0000 UTC m=+319.190048289" watchObservedRunningTime="2024-02-13 01:39:44.770214018 +0000 UTC m=+319.192243996" Feb 13 01:39:44.784000 audit[6781]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=6781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:44.784000 audit[6781]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd621b0700 a2=0 a3=7ffd621b06ec items=0 ppid=3066 pid=6781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:44.946193 kernel: audit: type=1325 audit(1707788384.784:350): table=filter:133 family=2 entries=8 op=nft_register_rule pid=6781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:44.946259 kernel: audit: type=1300 audit(1707788384.784:350): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd621b0700 a2=0 a3=7ffd621b06ec items=0 ppid=3066 pid=6781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:44.946280 kernel: audit: type=1327 audit(1707788384.784:350): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:44.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:44.785000 audit[6781]: NETFILTER_CFG table=nat:134 family=2 entries=78 op=nft_register_rule pid=6781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:44.785000 audit[6781]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd621b0700 a2=0 a3=7ffd621b06ec items=0 ppid=3066 pid=6781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:45.173023 kernel: audit: type=1325 audit(1707788384.785:351): table=nat:134 family=2 entries=78 op=nft_register_rule pid=6781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:45.173058 kernel: audit: type=1300 audit(1707788384.785:351): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd621b0700 a2=0 a3=7ffd621b06ec items=0 ppid=3066 pid=6781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:45.173074 kernel: audit: type=1327 audit(1707788384.785:351): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:44.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:45.031000 audit[6808]: NETFILTER_CFG table=filter:135 family=2 entries=8 op=nft_register_rule pid=6808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:45.031000 audit[6808]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdf79050b0 a2=0 a3=7ffdf790509c items=0 ppid=3066 pid=6808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:45.402103 kernel: audit: type=1325 audit(1707788385.031:352): table=filter:135 family=2 entries=8 op=nft_register_rule pid=6808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:45.402142 kernel: audit: type=1300 audit(1707788385.031:352): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdf79050b0 a2=0 a3=7ffdf790509c items=0 ppid=3066 pid=6808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:45.402166 kernel: audit: type=1327 audit(1707788385.031:352): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:45.031000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:45.243000 audit[6808]: NETFILTER_CFG table=nat:136 family=2 entries=78 op=nft_register_rule pid=6808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:45.243000 audit[6808]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffdf79050b0 a2=0 a3=7ffdf790509c items=0 ppid=3066 pid=6808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:45.243000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:45.524825 kernel: audit: type=1325 audit(1707788385.243:353): table=nat:136 family=2 entries=78 op=nft_register_rule pid=6808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:50.217000 audit[6874]: NETFILTER_CFG table=filter:137 family=2 entries=7 op=nft_register_rule pid=6874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:50.245361 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:39:50.245473 kernel: audit: type=1325 audit(1707788390.217:354): table=filter:137 family=2 entries=7 op=nft_register_rule pid=6874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:50.217000 audit[6874]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdf6f0df30 a2=0 a3=7ffdf6f0df1c items=0 ppid=3066 pid=6874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:50.403119 kernel: audit: type=1300 audit(1707788390.217:354): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdf6f0df30 a2=0 a3=7ffdf6f0df1c items=0 ppid=3066 pid=6874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:50.403172 kernel: audit: type=1327 audit(1707788390.217:354): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:50.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:50.218000 audit[6874]: NETFILTER_CFG table=nat:138 family=2 entries=85 op=nft_register_chain pid=6874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:50.218000 audit[6874]: SYSCALL arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffdf6f0df30 a2=0 a3=7ffdf6f0df1c items=0 ppid=3066 pid=6874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:50.621871 kernel: audit: type=1325 audit(1707788390.218:355): table=nat:138 family=2 entries=85 op=nft_register_chain pid=6874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:50.621929 kernel: audit: type=1300 audit(1707788390.218:355): arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffdf6f0df30 a2=0 a3=7ffdf6f0df1c items=0 ppid=3066 pid=6874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:50.621951 kernel: audit: type=1327 audit(1707788390.218:355): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:50.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:50.482000 audit[6901]: NETFILTER_CFG table=filter:139 family=2 entries=6 op=nft_register_rule pid=6901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:50.482000 audit[6901]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcd1399b50 a2=0 a3=7ffcd1399b3c items=0 ppid=3066 pid=6901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:50.848964 kernel: audit: type=1325 audit(1707788390.482:356): table=filter:139 family=2 entries=6 op=nft_register_rule pid=6901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:50.849010 kernel: audit: type=1300 audit(1707788390.482:356): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcd1399b50 a2=0 a3=7ffcd1399b3c items=0 ppid=3066 pid=6901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:50.849026 kernel: audit: type=1327 audit(1707788390.482:356): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:50.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:50.691000 audit[6901]: NETFILTER_CFG table=nat:140 family=2 entries=92 op=nft_register_chain pid=6901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:50.691000 audit[6901]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffcd1399b50 a2=0 a3=7ffcd1399b3c items=0 ppid=3066 pid=6901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:39:50.691000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:39:50.971822 kernel: audit: type=1325 audit(1707788390.691:357): table=nat:140 family=2 entries=92 op=nft_register_chain pid=6901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:39:59.158335 systemd[1]: Started sshd@18-147.75.90.7:22-124.221.122.203:40618.service. Feb 13 01:39:59.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.7:22-124.221.122.203:40618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:59.185765 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:39:59.185820 kernel: audit: type=1130 audit(1707788399.157:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.7:22-124.221.122.203:40618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:00.683155 sshd[6949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.122.203 user=root Feb 13 01:40:00.682000 audit[6949]: USER_AUTH pid=6949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.122.203 addr=124.221.122.203 terminal=ssh res=failed' Feb 13 01:40:00.773827 kernel: audit: type=1100 audit(1707788400.682:359): pid=6949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.122.203 addr=124.221.122.203 terminal=ssh res=failed' Feb 13 01:40:03.014139 sshd[6949]: Failed password for root from 124.221.122.203 port 40618 ssh2 Feb 13 01:40:04.124575 sshd[6949]: Received disconnect from 124.221.122.203 port 40618:11: Bye Bye [preauth] Feb 13 01:40:04.124575 sshd[6949]: Disconnected from authenticating user root 124.221.122.203 port 40618 [preauth] Feb 13 01:40:04.127048 systemd[1]: sshd@18-147.75.90.7:22-124.221.122.203:40618.service: Deactivated successfully. Feb 13 01:40:04.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.7:22-124.221.122.203:40618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:04.219811 kernel: audit: type=1131 audit(1707788404.127:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.7:22-124.221.122.203:40618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:05.122331 systemd[1]: Started sshd@19-147.75.90.7:22-120.53.106.207:44616.service. Feb 13 01:40:05.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.7:22-120.53.106.207:44616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:05.212710 kernel: audit: type=1130 audit(1707788405.121:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.7:22-120.53.106.207:44616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:05.991195 systemd[1]: Started sshd@20-147.75.90.7:22-14.116.200.5:42138.service. Feb 13 01:40:05.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.7:22-14.116.200.5:42138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:06.081706 kernel: audit: type=1130 audit(1707788405.990:362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.7:22-14.116.200.5:42138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:13.957670 systemd[1]: Started sshd@21-147.75.90.7:22-124.221.203.42:33060.service. Feb 13 01:40:13.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.7:22-124.221.203.42:33060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:14.049822 kernel: audit: type=1130 audit(1707788413.957:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.7:22-124.221.203.42:33060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:32.910016 systemd[1]: Started sshd@22-147.75.90.7:22-101.35.252.142:36608.service. Feb 13 01:40:32.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.7:22-101.35.252.142:36608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:33.000661 kernel: audit: type=1130 audit(1707788432.908:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.7:22-101.35.252.142:36608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:40.895811 systemd[1]: Started sshd@23-147.75.90.7:22-139.178.68.195:34326.service. Feb 13 01:40:40.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.7:22-139.178.68.195:34326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:40.986669 kernel: audit: type=1130 audit(1707788440.895:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.7:22-139.178.68.195:34326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:41.013000 audit[7090]: USER_ACCT pid=7090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.013757 sshd[7090]: Accepted publickey for core from 139.178.68.195 port 34326 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:40:41.016922 sshd[7090]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:40:41.019587 systemd-logind[1543]: New session 12 of user core. Feb 13 01:40:41.020138 systemd[1]: Started session-12.scope. Feb 13 01:40:41.016000 audit[7090]: CRED_ACQ pid=7090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.107429 sshd[7090]: pam_unix(sshd:session): session closed for user core Feb 13 01:40:41.108745 systemd[1]: sshd@23-147.75.90.7:22-139.178.68.195:34326.service: Deactivated successfully. Feb 13 01:40:41.109345 systemd-logind[1543]: Session 12 logged out. Waiting for processes to exit. Feb 13 01:40:41.109353 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 01:40:41.109751 systemd-logind[1543]: Removed session 12. Feb 13 01:40:41.198818 kernel: audit: type=1101 audit(1707788441.013:366): pid=7090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.198858 kernel: audit: type=1103 audit(1707788441.016:367): pid=7090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.198877 kernel: audit: type=1006 audit(1707788441.016:368): pid=7090 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 13 01:40:41.258250 kernel: audit: type=1300 audit(1707788441.016:368): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7d5f3c50 a2=3 a3=0 items=0 ppid=1 pid=7090 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:40:41.016000 audit[7090]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7d5f3c50 a2=3 a3=0 items=0 ppid=1 pid=7090 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:40:41.351599 kernel: audit: type=1327 audit(1707788441.016:368): proctitle=737368643A20636F7265205B707269765D Feb 13 01:40:41.016000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:40:41.382491 kernel: audit: type=1105 audit(1707788441.021:369): pid=7090 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.021000 audit[7090]: USER_START pid=7090 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.478358 kernel: audit: type=1103 audit(1707788441.021:370): pid=7093 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.021000 audit[7093]: CRED_ACQ pid=7093 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.568075 kernel: audit: type=1106 audit(1707788441.107:371): pid=7090 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.107000 audit[7090]: USER_END pid=7090 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.664025 kernel: audit: type=1104 audit(1707788441.107:372): pid=7090 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.107000 audit[7090]: CRED_DISP pid=7090 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:41.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.7:22-139.178.68.195:34326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:46.114263 systemd[1]: Started sshd@24-147.75.90.7:22-139.178.68.195:53518.service. Feb 13 01:40:46.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.7:22-139.178.68.195:53518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:46.141812 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:40:46.141906 kernel: audit: type=1130 audit(1707788446.113:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.7:22-139.178.68.195:53518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:46.260469 sshd[7119]: Accepted publickey for core from 139.178.68.195 port 53518 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:40:46.259000 audit[7119]: USER_ACCT pid=7119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.261891 sshd[7119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:40:46.264230 systemd-logind[1543]: New session 13 of user core. Feb 13 01:40:46.264724 systemd[1]: Started session-13.scope. Feb 13 01:40:46.346654 sshd[7119]: pam_unix(sshd:session): session closed for user core Feb 13 01:40:46.348036 systemd[1]: sshd@24-147.75.90.7:22-139.178.68.195:53518.service: Deactivated successfully. Feb 13 01:40:46.348595 systemd-logind[1543]: Session 13 logged out. Waiting for processes to exit. Feb 13 01:40:46.348638 systemd[1]: session-13.scope: Deactivated successfully. Feb 13 01:40:46.349163 systemd-logind[1543]: Removed session 13. Feb 13 01:40:46.261000 audit[7119]: CRED_ACQ pid=7119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.444451 kernel: audit: type=1101 audit(1707788446.259:375): pid=7119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.444497 kernel: audit: type=1103 audit(1707788446.261:376): pid=7119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.444518 kernel: audit: type=1006 audit(1707788446.261:377): pid=7119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 13 01:40:46.503508 kernel: audit: type=1300 audit(1707788446.261:377): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa8ca4df0 a2=3 a3=0 items=0 ppid=1 pid=7119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:40:46.261000 audit[7119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa8ca4df0 a2=3 a3=0 items=0 ppid=1 pid=7119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:40:46.596349 kernel: audit: type=1327 audit(1707788446.261:377): proctitle=737368643A20636F7265205B707269765D Feb 13 01:40:46.261000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:40:46.627093 kernel: audit: type=1105 audit(1707788446.266:378): pid=7119 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.266000 audit[7119]: USER_START pid=7119 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.722452 kernel: audit: type=1103 audit(1707788446.266:379): pid=7122 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.266000 audit[7122]: CRED_ACQ pid=7122 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.811710 kernel: audit: type=1106 audit(1707788446.346:380): pid=7119 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.346000 audit[7119]: USER_END pid=7119 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.907342 kernel: audit: type=1104 audit(1707788446.346:381): pid=7119 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.346000 audit[7119]: CRED_DISP pid=7119 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:46.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.7:22-139.178.68.195:53518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:51.353806 systemd[1]: Started sshd@25-147.75.90.7:22-139.178.68.195:53530.service. Feb 13 01:40:51.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.7:22-139.178.68.195:53530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:51.380928 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:40:51.381006 kernel: audit: type=1130 audit(1707788451.353:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.7:22-139.178.68.195:53530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:51.497000 audit[7188]: USER_ACCT pid=7188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:51.498014 sshd[7188]: Accepted publickey for core from 139.178.68.195 port 53530 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:40:51.499864 sshd[7188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:40:51.502292 systemd-logind[1543]: New session 14 of user core. Feb 13 01:40:51.502743 systemd[1]: Started session-14.scope. Feb 13 01:40:51.583369 sshd[7188]: pam_unix(sshd:session): session closed for user core Feb 13 01:40:51.584833 systemd[1]: sshd@25-147.75.90.7:22-139.178.68.195:53530.service: Deactivated successfully. Feb 13 01:40:51.585457 systemd-logind[1543]: Session 14 logged out. Waiting for processes to exit. Feb 13 01:40:51.585478 systemd[1]: session-14.scope: Deactivated successfully. Feb 13 01:40:51.586070 systemd-logind[1543]: Removed session 14. Feb 13 01:40:51.499000 audit[7188]: CRED_ACQ pid=7188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:51.679818 kernel: audit: type=1101 audit(1707788451.497:384): pid=7188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:51.679856 kernel: audit: type=1103 audit(1707788451.499:385): pid=7188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:51.679873 kernel: audit: type=1006 audit(1707788451.499:386): pid=7188 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 13 01:40:51.738399 kernel: audit: type=1300 audit(1707788451.499:386): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf29ed440 a2=3 a3=0 items=0 ppid=1 pid=7188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:40:51.499000 audit[7188]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf29ed440 a2=3 a3=0 items=0 ppid=1 pid=7188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:40:51.830427 kernel: audit: type=1327 audit(1707788451.499:386): proctitle=737368643A20636F7265205B707269765D Feb 13 01:40:51.499000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:40:51.860898 kernel: audit: type=1105 audit(1707788451.504:387): pid=7188 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:51.504000 audit[7188]: USER_START pid=7188 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:51.955533 kernel: audit: type=1103 audit(1707788451.504:388): pid=7191 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:51.504000 audit[7191]: CRED_ACQ pid=7191 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:52.044697 kernel: audit: type=1106 audit(1707788451.583:389): pid=7188 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:51.583000 audit[7188]: USER_END pid=7188 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:52.140185 kernel: audit: type=1104 audit(1707788451.583:390): pid=7188 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:51.583000 audit[7188]: CRED_DISP pid=7188 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:51.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.7:22-139.178.68.195:53530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:56.592605 systemd[1]: Started sshd@26-147.75.90.7:22-139.178.68.195:58970.service. Feb 13 01:40:56.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.7:22-139.178.68.195:58970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:56.620241 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:40:56.620319 kernel: audit: type=1130 audit(1707788456.592:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.7:22-139.178.68.195:58970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:56.734000 audit[7234]: USER_ACCT pid=7234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:56.735515 sshd[7234]: Accepted publickey for core from 139.178.68.195 port 58970 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:40:56.736923 sshd[7234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:40:56.739241 systemd-logind[1543]: New session 15 of user core. Feb 13 01:40:56.739779 systemd[1]: Started session-15.scope. Feb 13 01:40:56.817071 sshd[7234]: pam_unix(sshd:session): session closed for user core Feb 13 01:40:56.818400 systemd[1]: sshd@26-147.75.90.7:22-139.178.68.195:58970.service: Deactivated successfully. Feb 13 01:40:56.819079 systemd[1]: session-15.scope: Deactivated successfully. Feb 13 01:40:56.819111 systemd-logind[1543]: Session 15 logged out. Waiting for processes to exit. Feb 13 01:40:56.819866 systemd-logind[1543]: Removed session 15. Feb 13 01:40:56.736000 audit[7234]: CRED_ACQ pid=7234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:56.917312 kernel: audit: type=1101 audit(1707788456.734:393): pid=7234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:56.917352 kernel: audit: type=1103 audit(1707788456.736:394): pid=7234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:56.917369 kernel: audit: type=1006 audit(1707788456.736:395): pid=7234 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 13 01:40:56.736000 audit[7234]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc01f6e200 a2=3 a3=0 items=0 ppid=1 pid=7234 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:40:57.068016 kernel: audit: type=1300 audit(1707788456.736:395): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc01f6e200 a2=3 a3=0 items=0 ppid=1 pid=7234 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:40:57.068051 kernel: audit: type=1327 audit(1707788456.736:395): proctitle=737368643A20636F7265205B707269765D Feb 13 01:40:56.736000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:40:57.098459 kernel: audit: type=1105 audit(1707788456.741:396): pid=7234 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:56.741000 audit[7234]: USER_START pid=7234 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:57.143792 systemd[1]: Started sshd@27-147.75.90.7:22-124.221.203.42:40544.service. Feb 13 01:40:57.192906 kernel: audit: type=1103 audit(1707788456.742:397): pid=7237 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:56.742000 audit[7237]: CRED_ACQ pid=7237 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:56.817000 audit[7234]: USER_END pid=7234 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:57.377688 kernel: audit: type=1106 audit(1707788456.817:398): pid=7234 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:57.377719 kernel: audit: type=1104 audit(1707788456.817:399): pid=7234 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:56.817000 audit[7234]: CRED_DISP pid=7234 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:40:56.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.7:22-139.178.68.195:58970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:57.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.90.7:22-124.221.203.42:40544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:01.823893 systemd[1]: Started sshd@28-147.75.90.7:22-139.178.68.195:58984.service. Feb 13 01:41:01.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.7:22-139.178.68.195:58984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:01.851142 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:41:01.851207 kernel: audit: type=1130 audit(1707788461.822:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.7:22-139.178.68.195:58984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:01.967000 audit[7291]: USER_ACCT pid=7291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:01.968387 sshd[7291]: Accepted publickey for core from 139.178.68.195 port 58984 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:01.970131 sshd[7291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:01.972620 systemd-logind[1543]: New session 16 of user core. Feb 13 01:41:01.973066 systemd[1]: Started session-16.scope. Feb 13 01:41:02.052566 sshd[7291]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:02.053985 systemd[1]: sshd@28-147.75.90.7:22-139.178.68.195:58984.service: Deactivated successfully. Feb 13 01:41:02.054596 systemd-logind[1543]: Session 16 logged out. Waiting for processes to exit. Feb 13 01:41:02.054607 systemd[1]: session-16.scope: Deactivated successfully. Feb 13 01:41:02.055182 systemd-logind[1543]: Removed session 16. Feb 13 01:41:01.968000 audit[7291]: CRED_ACQ pid=7291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:02.150135 kernel: audit: type=1101 audit(1707788461.967:403): pid=7291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:02.150184 kernel: audit: type=1103 audit(1707788461.968:404): pid=7291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:02.150201 kernel: audit: type=1006 audit(1707788461.968:405): pid=7291 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 13 01:41:02.208703 kernel: audit: type=1300 audit(1707788461.968:405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe62a3b3f0 a2=3 a3=0 items=0 ppid=1 pid=7291 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:01.968000 audit[7291]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe62a3b3f0 a2=3 a3=0 items=0 ppid=1 pid=7291 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:02.300700 kernel: audit: type=1327 audit(1707788461.968:405): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:01.968000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:02.331100 kernel: audit: type=1105 audit(1707788461.973:406): pid=7291 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:01.973000 audit[7291]: USER_START pid=7291 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:02.425632 kernel: audit: type=1103 audit(1707788461.974:407): pid=7294 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:01.974000 audit[7294]: CRED_ACQ pid=7294 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:02.514765 kernel: audit: type=1106 audit(1707788462.051:408): pid=7291 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:02.051000 audit[7291]: USER_END pid=7291 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:02.610188 kernel: audit: type=1104 audit(1707788462.051:409): pid=7291 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:02.051000 audit[7291]: CRED_DISP pid=7291 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:02.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.7:22-139.178.68.195:58984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:07.059596 systemd[1]: Started sshd@29-147.75.90.7:22-139.178.68.195:47072.service. Feb 13 01:41:07.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.7:22-139.178.68.195:47072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:07.086962 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:41:07.087053 kernel: audit: type=1130 audit(1707788467.058:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.7:22-139.178.68.195:47072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:07.202000 audit[7326]: USER_ACCT pid=7326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.203584 sshd[7326]: Accepted publickey for core from 139.178.68.195 port 47072 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:07.205443 sshd[7326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:07.208061 systemd-logind[1543]: New session 17 of user core. Feb 13 01:41:07.208465 systemd[1]: Started session-17.scope. Feb 13 01:41:07.287326 sshd[7326]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:07.288668 systemd[1]: sshd@29-147.75.90.7:22-139.178.68.195:47072.service: Deactivated successfully. Feb 13 01:41:07.289279 systemd-logind[1543]: Session 17 logged out. Waiting for processes to exit. Feb 13 01:41:07.289288 systemd[1]: session-17.scope: Deactivated successfully. Feb 13 01:41:07.289704 systemd-logind[1543]: Removed session 17. Feb 13 01:41:07.203000 audit[7326]: CRED_ACQ pid=7326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.385402 kernel: audit: type=1101 audit(1707788467.202:412): pid=7326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.385444 kernel: audit: type=1103 audit(1707788467.203:413): pid=7326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.385460 kernel: audit: type=1006 audit(1707788467.203:414): pid=7326 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 13 01:41:07.443943 kernel: audit: type=1300 audit(1707788467.203:414): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c8a08f0 a2=3 a3=0 items=0 ppid=1 pid=7326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:07.203000 audit[7326]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c8a08f0 a2=3 a3=0 items=0 ppid=1 pid=7326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:07.535966 kernel: audit: type=1327 audit(1707788467.203:414): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:07.203000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:07.566401 kernel: audit: type=1105 audit(1707788467.208:415): pid=7326 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.208000 audit[7326]: USER_START pid=7326 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.660888 kernel: audit: type=1103 audit(1707788467.209:416): pid=7329 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.209000 audit[7329]: CRED_ACQ pid=7329 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.286000 audit[7326]: USER_END pid=7326 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.845565 kernel: audit: type=1106 audit(1707788467.286:417): pid=7326 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.845601 kernel: audit: type=1104 audit(1707788467.286:418): pid=7326 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.286000 audit[7326]: CRED_DISP pid=7326 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:07.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.7:22-139.178.68.195:47072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:12.289799 systemd[1]: Started sshd@30-147.75.90.7:22-139.178.68.195:47084.service. Feb 13 01:41:12.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.7:22-139.178.68.195:47084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:12.316876 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:41:12.316947 kernel: audit: type=1130 audit(1707788472.288:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.7:22-139.178.68.195:47084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:12.431000 audit[7356]: USER_ACCT pid=7356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.433135 sshd[7356]: Accepted publickey for core from 139.178.68.195 port 47084 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:12.436034 sshd[7356]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:12.443687 systemd-logind[1543]: New session 18 of user core. Feb 13 01:41:12.445672 systemd[1]: Started session-18.scope. Feb 13 01:41:12.433000 audit[7356]: CRED_ACQ pid=7356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.528518 sshd[7356]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:12.530087 systemd[1]: Started sshd@31-147.75.90.7:22-139.178.68.195:47086.service. Feb 13 01:41:12.530403 systemd[1]: sshd@30-147.75.90.7:22-139.178.68.195:47084.service: Deactivated successfully. Feb 13 01:41:12.530953 systemd[1]: session-18.scope: Deactivated successfully. Feb 13 01:41:12.530985 systemd-logind[1543]: Session 18 logged out. Waiting for processes to exit. Feb 13 01:41:12.531360 systemd-logind[1543]: Removed session 18. Feb 13 01:41:12.614629 kernel: audit: type=1101 audit(1707788472.431:421): pid=7356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.614675 kernel: audit: type=1103 audit(1707788472.433:422): pid=7356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.614693 kernel: audit: type=1006 audit(1707788472.433:423): pid=7356 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 13 01:41:12.673170 kernel: audit: type=1300 audit(1707788472.433:423): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff36a00150 a2=3 a3=0 items=0 ppid=1 pid=7356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:12.433000 audit[7356]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff36a00150 a2=3 a3=0 items=0 ppid=1 pid=7356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:12.700206 sshd[7382]: Accepted publickey for core from 139.178.68.195 port 47086 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:12.700919 sshd[7382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:12.703081 systemd-logind[1543]: New session 19 of user core. Feb 13 01:41:12.704700 systemd[1]: Started session-19.scope. Feb 13 01:41:12.433000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:12.795761 kernel: audit: type=1327 audit(1707788472.433:423): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:12.795843 kernel: audit: type=1105 audit(1707788472.450:424): pid=7356 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.450000 audit[7356]: USER_START pid=7356 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.451000 audit[7359]: CRED_ACQ pid=7359 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.979519 kernel: audit: type=1103 audit(1707788472.451:425): pid=7359 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.979601 kernel: audit: type=1106 audit(1707788472.527:426): pid=7356 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.527000 audit[7356]: USER_END pid=7356 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.527000 audit[7356]: CRED_DISP pid=7356 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:13.164484 kernel: audit: type=1104 audit(1707788472.527:427): pid=7356 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.90.7:22-139.178.68.195:47086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:12.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.7:22-139.178.68.195:47084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:12.698000 audit[7382]: USER_ACCT pid=7382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.699000 audit[7382]: CRED_ACQ pid=7382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.699000 audit[7382]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe672b5460 a2=3 a3=0 items=0 ppid=1 pid=7382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:12.699000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:12.705000 audit[7382]: USER_START pid=7382 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:12.705000 audit[7386]: CRED_ACQ pid=7386 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:13.389777 sshd[7382]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:13.388000 audit[7382]: USER_END pid=7382 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:13.389000 audit[7382]: CRED_DISP pid=7382 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:13.391460 systemd[1]: Started sshd@32-147.75.90.7:22-139.178.68.195:47094.service. Feb 13 01:41:13.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.90.7:22-139.178.68.195:47094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:13.391854 systemd[1]: sshd@31-147.75.90.7:22-139.178.68.195:47086.service: Deactivated successfully. Feb 13 01:41:13.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.90.7:22-139.178.68.195:47086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:13.392483 systemd-logind[1543]: Session 19 logged out. Waiting for processes to exit. Feb 13 01:41:13.392516 systemd[1]: session-19.scope: Deactivated successfully. Feb 13 01:41:13.392945 systemd-logind[1543]: Removed session 19. Feb 13 01:41:13.422000 audit[7406]: USER_ACCT pid=7406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:13.424128 sshd[7406]: Accepted publickey for core from 139.178.68.195 port 47094 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:13.423000 audit[7406]: CRED_ACQ pid=7406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:13.423000 audit[7406]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3f831450 a2=3 a3=0 items=0 ppid=1 pid=7406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:13.423000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:13.424925 sshd[7406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:13.427857 systemd-logind[1543]: New session 20 of user core. Feb 13 01:41:13.428462 systemd[1]: Started session-20.scope. Feb 13 01:41:13.429000 audit[7406]: USER_START pid=7406 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:13.430000 audit[7412]: CRED_ACQ pid=7412 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:13.556809 sshd[7406]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:13.556000 audit[7406]: USER_END pid=7406 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:13.556000 audit[7406]: CRED_DISP pid=7406 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:13.558557 systemd[1]: sshd@32-147.75.90.7:22-139.178.68.195:47094.service: Deactivated successfully. Feb 13 01:41:13.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.90.7:22-139.178.68.195:47094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:13.559304 systemd-logind[1543]: Session 20 logged out. Waiting for processes to exit. Feb 13 01:41:13.559332 systemd[1]: session-20.scope: Deactivated successfully. Feb 13 01:41:13.560065 systemd-logind[1543]: Removed session 20. Feb 13 01:41:18.563263 systemd[1]: Started sshd@33-147.75.90.7:22-139.178.68.195:53468.service. Feb 13 01:41:18.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.7:22-139.178.68.195:53468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:18.590322 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 13 01:41:18.590385 kernel: audit: type=1130 audit(1707788478.562:447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.7:22-139.178.68.195:53468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:18.706000 audit[7435]: USER_ACCT pid=7435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:18.706787 sshd[7435]: Accepted publickey for core from 139.178.68.195 port 53468 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:18.708220 sshd[7435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:18.710685 systemd-logind[1543]: New session 21 of user core. Feb 13 01:41:18.711137 systemd[1]: Started session-21.scope. Feb 13 01:41:18.788960 sshd[7435]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:18.790232 systemd[1]: sshd@33-147.75.90.7:22-139.178.68.195:53468.service: Deactivated successfully. Feb 13 01:41:18.790890 systemd-logind[1543]: Session 21 logged out. Waiting for processes to exit. Feb 13 01:41:18.790902 systemd[1]: session-21.scope: Deactivated successfully. Feb 13 01:41:18.791414 systemd-logind[1543]: Removed session 21. Feb 13 01:41:18.707000 audit[7435]: CRED_ACQ pid=7435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:18.888609 kernel: audit: type=1101 audit(1707788478.706:448): pid=7435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:18.888651 kernel: audit: type=1103 audit(1707788478.707:449): pid=7435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:18.888667 kernel: audit: type=1006 audit(1707788478.707:450): pid=7435 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 13 01:41:18.947169 kernel: audit: type=1300 audit(1707788478.707:450): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecf48b840 a2=3 a3=0 items=0 ppid=1 pid=7435 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:18.707000 audit[7435]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecf48b840 a2=3 a3=0 items=0 ppid=1 pid=7435 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:19.039183 kernel: audit: type=1327 audit(1707788478.707:450): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:18.707000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:19.069701 kernel: audit: type=1105 audit(1707788478.712:451): pid=7435 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:18.712000 audit[7435]: USER_START pid=7435 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:19.164098 kernel: audit: type=1103 audit(1707788478.713:452): pid=7438 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:18.713000 audit[7438]: CRED_ACQ pid=7438 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:19.253211 kernel: audit: type=1106 audit(1707788478.788:453): pid=7435 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:18.788000 audit[7435]: USER_END pid=7435 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:18.788000 audit[7435]: CRED_DISP pid=7435 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:19.437964 kernel: audit: type=1104 audit(1707788478.788:454): pid=7435 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:18.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.7:22-139.178.68.195:53468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:23.795241 systemd[1]: Started sshd@34-147.75.90.7:22-139.178.68.195:53472.service. Feb 13 01:41:23.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.7:22-139.178.68.195:53472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:23.822348 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:41:23.822434 kernel: audit: type=1130 audit(1707788483.794:456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.7:22-139.178.68.195:53472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:23.938000 audit[7500]: USER_ACCT pid=7500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:23.938907 sshd[7500]: Accepted publickey for core from 139.178.68.195 port 53472 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:23.941133 sshd[7500]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:23.943557 systemd-logind[1543]: New session 22 of user core. Feb 13 01:41:23.944041 systemd[1]: Started session-22.scope. Feb 13 01:41:24.025783 sshd[7500]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:24.027112 systemd[1]: sshd@34-147.75.90.7:22-139.178.68.195:53472.service: Deactivated successfully. Feb 13 01:41:24.027727 systemd[1]: session-22.scope: Deactivated successfully. Feb 13 01:41:24.027785 systemd-logind[1543]: Session 22 logged out. Waiting for processes to exit. Feb 13 01:41:24.028344 systemd-logind[1543]: Removed session 22. Feb 13 01:41:23.940000 audit[7500]: CRED_ACQ pid=7500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:24.122360 kernel: audit: type=1101 audit(1707788483.938:457): pid=7500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:24.122400 kernel: audit: type=1103 audit(1707788483.940:458): pid=7500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:24.122422 kernel: audit: type=1006 audit(1707788483.940:459): pid=7500 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 13 01:41:24.181044 kernel: audit: type=1300 audit(1707788483.940:459): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3facc450 a2=3 a3=0 items=0 ppid=1 pid=7500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:23.940000 audit[7500]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3facc450 a2=3 a3=0 items=0 ppid=1 pid=7500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:24.273071 kernel: audit: type=1327 audit(1707788483.940:459): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:23.940000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:24.303529 kernel: audit: type=1105 audit(1707788483.946:460): pid=7500 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:23.946000 audit[7500]: USER_START pid=7500 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:24.397993 kernel: audit: type=1103 audit(1707788483.946:461): pid=7503 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:23.946000 audit[7503]: CRED_ACQ pid=7503 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:24.487191 kernel: audit: type=1106 audit(1707788484.025:462): pid=7500 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:24.025000 audit[7500]: USER_END pid=7500 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:24.582694 kernel: audit: type=1104 audit(1707788484.025:463): pid=7500 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:24.025000 audit[7500]: CRED_DISP pid=7500 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:24.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.7:22-139.178.68.195:53472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:26.674779 systemd[1]: Started sshd@35-147.75.90.7:22-62.122.184.252:19612.service. Feb 13 01:41:26.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.90.7:22-62.122.184.252:19612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:27.635724 sshd[7567]: Invalid user admin from 62.122.184.252 port 19612 Feb 13 01:41:27.637079 sshd[7567]: pam_faillock(sshd:auth): User unknown Feb 13 01:41:27.637351 sshd[7567]: pam_unix(sshd:auth): check pass; user unknown Feb 13 01:41:27.637399 sshd[7567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.184.252 Feb 13 01:41:27.637575 sshd[7567]: pam_faillock(sshd:auth): User unknown Feb 13 01:41:27.637000 audit[7567]: USER_AUTH pid=7567 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=62.122.184.252 addr=62.122.184.252 terminal=ssh res=failed' Feb 13 01:41:29.034450 systemd[1]: Started sshd@36-147.75.90.7:22-139.178.68.195:36330.service. Feb 13 01:41:29.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.7:22-139.178.68.195:36330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:29.062346 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 01:41:29.062449 kernel: audit: type=1130 audit(1707788489.034:467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.7:22-139.178.68.195:36330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:29.178000 audit[7596]: USER_ACCT pid=7596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.179610 sshd[7596]: Accepted publickey for core from 139.178.68.195 port 36330 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:29.180922 sshd[7596]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:29.183349 systemd-logind[1543]: New session 23 of user core. Feb 13 01:41:29.183818 systemd[1]: Started session-23.scope. Feb 13 01:41:29.244688 sshd[7567]: Failed password for invalid user admin from 62.122.184.252 port 19612 ssh2 Feb 13 01:41:29.262253 sshd[7596]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:29.263668 systemd[1]: sshd@36-147.75.90.7:22-139.178.68.195:36330.service: Deactivated successfully. Feb 13 01:41:29.264310 systemd[1]: session-23.scope: Deactivated successfully. Feb 13 01:41:29.264321 systemd-logind[1543]: Session 23 logged out. Waiting for processes to exit. Feb 13 01:41:29.265211 systemd-logind[1543]: Removed session 23. Feb 13 01:41:29.180000 audit[7596]: CRED_ACQ pid=7596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.361414 kernel: audit: type=1101 audit(1707788489.178:468): pid=7596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.361451 kernel: audit: type=1103 audit(1707788489.180:469): pid=7596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.361467 kernel: audit: type=1006 audit(1707788489.180:470): pid=7596 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 13 01:41:29.420001 kernel: audit: type=1300 audit(1707788489.180:470): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb4c95d0 a2=3 a3=0 items=0 ppid=1 pid=7596 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:29.180000 audit[7596]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb4c95d0 a2=3 a3=0 items=0 ppid=1 pid=7596 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:29.512096 kernel: audit: type=1327 audit(1707788489.180:470): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:29.180000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:29.542556 kernel: audit: type=1105 audit(1707788489.185:471): pid=7596 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.185000 audit[7596]: USER_START pid=7596 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.637272 kernel: audit: type=1103 audit(1707788489.185:472): pid=7599 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.185000 audit[7599]: CRED_ACQ pid=7599 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.726481 kernel: audit: type=1106 audit(1707788489.262:473): pid=7596 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.262000 audit[7596]: USER_END pid=7596 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.821963 kernel: audit: type=1104 audit(1707788489.262:474): pid=7596 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.262000 audit[7596]: CRED_DISP pid=7596 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:29.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.7:22-139.178.68.195:36330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:30.902695 sshd[7567]: Received disconnect from 62.122.184.252 port 19612:11: Client disconnecting normally [preauth] Feb 13 01:41:30.902695 sshd[7567]: Disconnected from invalid user admin 62.122.184.252 port 19612 [preauth] Feb 13 01:41:30.905159 systemd[1]: sshd@35-147.75.90.7:22-62.122.184.252:19612.service: Deactivated successfully. Feb 13 01:41:30.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.90.7:22-62.122.184.252:19612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:34.268353 systemd[1]: Started sshd@37-147.75.90.7:22-139.178.68.195:36342.service. Feb 13 01:41:34.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.7:22-139.178.68.195:36342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:34.295509 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:41:34.295551 kernel: audit: type=1130 audit(1707788494.267:477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.7:22-139.178.68.195:36342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:34.412000 audit[7625]: USER_ACCT pid=7625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.413257 sshd[7625]: Accepted publickey for core from 139.178.68.195 port 36342 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:34.415666 sshd[7625]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:34.421301 systemd-logind[1543]: New session 24 of user core. Feb 13 01:41:34.422831 systemd[1]: Started session-24.scope. Feb 13 01:41:34.414000 audit[7625]: CRED_ACQ pid=7625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.507650 sshd[7625]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:34.509013 systemd[1]: sshd@37-147.75.90.7:22-139.178.68.195:36342.service: Deactivated successfully. Feb 13 01:41:34.509571 systemd-logind[1543]: Session 24 logged out. Waiting for processes to exit. Feb 13 01:41:34.509592 systemd[1]: session-24.scope: Deactivated successfully. Feb 13 01:41:34.510198 systemd-logind[1543]: Removed session 24. Feb 13 01:41:34.594961 kernel: audit: type=1101 audit(1707788494.412:478): pid=7625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.595001 kernel: audit: type=1103 audit(1707788494.414:479): pid=7625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.595016 kernel: audit: type=1006 audit(1707788494.414:480): pid=7625 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 13 01:41:34.653523 kernel: audit: type=1300 audit(1707788494.414:480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7d5b6c30 a2=3 a3=0 items=0 ppid=1 pid=7625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:34.414000 audit[7625]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7d5b6c30 a2=3 a3=0 items=0 ppid=1 pid=7625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:34.745548 kernel: audit: type=1327 audit(1707788494.414:480): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:34.414000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:34.775985 kernel: audit: type=1105 audit(1707788494.429:481): pid=7625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.429000 audit[7625]: USER_START pid=7625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.870409 kernel: audit: type=1103 audit(1707788494.430:482): pid=7628 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.430000 audit[7628]: CRED_ACQ pid=7628 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.959601 kernel: audit: type=1106 audit(1707788494.507:483): pid=7625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.507000 audit[7625]: USER_END pid=7625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:35.055044 kernel: audit: type=1104 audit(1707788494.507:484): pid=7625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.507000 audit[7625]: CRED_DISP pid=7625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:34.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.7:22-139.178.68.195:36342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:39.510783 systemd[1]: Started sshd@38-147.75.90.7:22-139.178.68.195:47050.service. Feb 13 01:41:39.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.7:22-139.178.68.195:47050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:39.537910 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:41:39.537965 kernel: audit: type=1130 audit(1707788499.510:486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.7:22-139.178.68.195:47050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:39.654000 audit[7653]: USER_ACCT pid=7653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:39.654936 sshd[7653]: Accepted publickey for core from 139.178.68.195 port 47050 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:39.656123 sshd[7653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:39.658399 systemd-logind[1543]: New session 25 of user core. Feb 13 01:41:39.658864 systemd[1]: Started session-25.scope. Feb 13 01:41:39.739444 sshd[7653]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:39.740886 systemd[1]: sshd@38-147.75.90.7:22-139.178.68.195:47050.service: Deactivated successfully. Feb 13 01:41:39.741481 systemd-logind[1543]: Session 25 logged out. Waiting for processes to exit. Feb 13 01:41:39.741521 systemd[1]: session-25.scope: Deactivated successfully. Feb 13 01:41:39.742117 systemd-logind[1543]: Removed session 25. Feb 13 01:41:39.655000 audit[7653]: CRED_ACQ pid=7653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:39.836583 kernel: audit: type=1101 audit(1707788499.654:487): pid=7653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:39.836628 kernel: audit: type=1103 audit(1707788499.655:488): pid=7653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:39.836645 kernel: audit: type=1006 audit(1707788499.655:489): pid=7653 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 13 01:41:39.895132 kernel: audit: type=1300 audit(1707788499.655:489): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2cbfbb80 a2=3 a3=0 items=0 ppid=1 pid=7653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:39.655000 audit[7653]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2cbfbb80 a2=3 a3=0 items=0 ppid=1 pid=7653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:39.987244 kernel: audit: type=1327 audit(1707788499.655:489): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:39.655000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:40.017685 kernel: audit: type=1105 audit(1707788499.660:490): pid=7653 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:39.660000 audit[7653]: USER_START pid=7653 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:40.112151 kernel: audit: type=1103 audit(1707788499.660:491): pid=7656 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:39.660000 audit[7656]: CRED_ACQ pid=7656 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:40.201285 kernel: audit: type=1106 audit(1707788499.739:492): pid=7653 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:39.739000 audit[7653]: USER_END pid=7653 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:40.297358 kernel: audit: type=1104 audit(1707788499.739:493): pid=7653 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:39.739000 audit[7653]: CRED_DISP pid=7653 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:39.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.7:22-139.178.68.195:47050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:41.349416 systemd[1]: Started sshd@39-147.75.90.7:22-124.221.203.42:48030.service. Feb 13 01:41:41.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.7:22-124.221.203.42:48030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:42.928182 sshd[7682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.203.42 user=root Feb 13 01:41:42.926000 audit[7682]: USER_AUTH pid=7682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.203.42 addr=124.221.203.42 terminal=ssh res=failed' Feb 13 01:41:44.259880 sshd[7682]: Failed password for root from 124.221.203.42 port 48030 ssh2 Feb 13 01:41:44.712953 sshd[7682]: Received disconnect from 124.221.203.42 port 48030:11: Bye Bye [preauth] Feb 13 01:41:44.712953 sshd[7682]: Disconnected from authenticating user root 124.221.203.42 port 48030 [preauth] Feb 13 01:41:44.715538 systemd[1]: sshd@39-147.75.90.7:22-124.221.203.42:48030.service: Deactivated successfully. Feb 13 01:41:44.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.7:22-124.221.203.42:48030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:44.742029 systemd[1]: Started sshd@40-147.75.90.7:22-139.178.68.195:47054.service. Feb 13 01:41:44.743216 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 01:41:44.743273 kernel: audit: type=1131 audit(1707788504.714:497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.7:22-124.221.203.42:48030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:44.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.7:22-139.178.68.195:47054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:44.920546 kernel: audit: type=1130 audit(1707788504.740:498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.7:22-139.178.68.195:47054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:44.946000 audit[7687]: USER_ACCT pid=7687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:44.947803 sshd[7687]: Accepted publickey for core from 139.178.68.195 port 47054 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:44.948928 sshd[7687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:44.951229 systemd-logind[1543]: New session 26 of user core. Feb 13 01:41:44.951879 systemd[1]: Started session-26.scope. Feb 13 01:41:45.031455 sshd[7687]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:45.032735 systemd[1]: sshd@40-147.75.90.7:22-139.178.68.195:47054.service: Deactivated successfully. Feb 13 01:41:45.033372 systemd-logind[1543]: Session 26 logged out. Waiting for processes to exit. Feb 13 01:41:45.033405 systemd[1]: session-26.scope: Deactivated successfully. Feb 13 01:41:45.033854 systemd-logind[1543]: Removed session 26. Feb 13 01:41:44.947000 audit[7687]: CRED_ACQ pid=7687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:45.130226 kernel: audit: type=1101 audit(1707788504.946:499): pid=7687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:45.130272 kernel: audit: type=1103 audit(1707788504.947:500): pid=7687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:45.130291 kernel: audit: type=1006 audit(1707788504.947:501): pid=7687 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 13 01:41:45.188757 kernel: audit: type=1300 audit(1707788504.947:501): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8b233b40 a2=3 a3=0 items=0 ppid=1 pid=7687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:44.947000 audit[7687]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8b233b40 a2=3 a3=0 items=0 ppid=1 pid=7687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:45.280782 kernel: audit: type=1327 audit(1707788504.947:501): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:44.947000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:45.311207 kernel: audit: type=1105 audit(1707788504.952:502): pid=7687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:44.952000 audit[7687]: USER_START pid=7687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:45.406572 kernel: audit: type=1103 audit(1707788504.952:503): pid=7691 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:44.952000 audit[7691]: CRED_ACQ pid=7691 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:45.495842 kernel: audit: type=1106 audit(1707788505.030:504): pid=7687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:45.030000 audit[7687]: USER_END pid=7687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:45.030000 audit[7687]: CRED_DISP pid=7687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:45.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.7:22-139.178.68.195:47054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:50.039244 systemd[1]: Started sshd@41-147.75.90.7:22-139.178.68.195:54688.service. Feb 13 01:41:50.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.7:22-139.178.68.195:54688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:50.066475 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:41:50.066539 kernel: audit: type=1130 audit(1707788510.037:507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.7:22-139.178.68.195:54688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:50.182000 audit[7714]: USER_ACCT pid=7714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.184111 sshd[7714]: Accepted publickey for core from 139.178.68.195 port 54688 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:50.185292 sshd[7714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:50.187221 systemd-logind[1543]: New session 27 of user core. Feb 13 01:41:50.187905 systemd[1]: Started session-27.scope. Feb 13 01:41:50.267132 sshd[7714]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:50.268433 systemd[1]: sshd@41-147.75.90.7:22-139.178.68.195:54688.service: Deactivated successfully. Feb 13 01:41:50.269042 systemd-logind[1543]: Session 27 logged out. Waiting for processes to exit. Feb 13 01:41:50.269093 systemd[1]: session-27.scope: Deactivated successfully. Feb 13 01:41:50.269532 systemd-logind[1543]: Removed session 27. Feb 13 01:41:50.183000 audit[7714]: CRED_ACQ pid=7714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.366706 kernel: audit: type=1101 audit(1707788510.182:508): pid=7714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.366745 kernel: audit: type=1103 audit(1707788510.183:509): pid=7714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.366762 kernel: audit: type=1006 audit(1707788510.183:510): pid=7714 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 13 01:41:50.425561 kernel: audit: type=1300 audit(1707788510.183:510): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe24cc6e90 a2=3 a3=0 items=0 ppid=1 pid=7714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:50.183000 audit[7714]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe24cc6e90 a2=3 a3=0 items=0 ppid=1 pid=7714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:50.518023 kernel: audit: type=1327 audit(1707788510.183:510): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:50.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:50.548607 kernel: audit: type=1105 audit(1707788510.188:511): pid=7714 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.188000 audit[7714]: USER_START pid=7714 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.643489 kernel: audit: type=1103 audit(1707788510.189:512): pid=7757 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.189000 audit[7757]: CRED_ACQ pid=7757 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.733154 kernel: audit: type=1106 audit(1707788510.266:513): pid=7714 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.266000 audit[7714]: USER_END pid=7714 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.829065 kernel: audit: type=1104 audit(1707788510.266:514): pid=7714 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.266000 audit[7714]: CRED_DISP pid=7714 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:50.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.7:22-139.178.68.195:54688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:55.274267 systemd[1]: Started sshd@42-147.75.90.7:22-139.178.68.195:54694.service. Feb 13 01:41:55.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.7:22-139.178.68.195:54694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:55.301402 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:41:55.301454 kernel: audit: type=1130 audit(1707788515.273:516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.7:22-139.178.68.195:54694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:55.417000 audit[7782]: USER_ACCT pid=7782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:55.418350 sshd[7782]: Accepted publickey for core from 139.178.68.195 port 54694 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:41:55.423894 sshd[7782]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:41:55.433882 systemd-logind[1543]: New session 28 of user core. Feb 13 01:41:55.435976 systemd[1]: Started session-28.scope. Feb 13 01:41:55.422000 audit[7782]: CRED_ACQ pid=7782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:55.599777 kernel: audit: type=1101 audit(1707788515.417:517): pid=7782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:55.599830 kernel: audit: type=1103 audit(1707788515.422:518): pid=7782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:55.599846 kernel: audit: type=1006 audit(1707788515.422:519): pid=7782 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 13 01:41:55.602353 sshd[7782]: pam_unix(sshd:session): session closed for user core Feb 13 01:41:55.603731 systemd[1]: sshd@42-147.75.90.7:22-139.178.68.195:54694.service: Deactivated successfully. Feb 13 01:41:55.604298 systemd[1]: session-28.scope: Deactivated successfully. Feb 13 01:41:55.604337 systemd-logind[1543]: Session 28 logged out. Waiting for processes to exit. Feb 13 01:41:55.604804 systemd-logind[1543]: Removed session 28. Feb 13 01:41:55.658671 kernel: audit: type=1300 audit(1707788515.422:519): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe97bdabf0 a2=3 a3=0 items=0 ppid=1 pid=7782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:55.422000 audit[7782]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe97bdabf0 a2=3 a3=0 items=0 ppid=1 pid=7782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:41:55.422000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:55.781644 kernel: audit: type=1327 audit(1707788515.422:519): proctitle=737368643A20636F7265205B707269765D Feb 13 01:41:55.781679 kernel: audit: type=1105 audit(1707788515.437:520): pid=7782 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:55.437000 audit[7782]: USER_START pid=7782 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:55.876688 kernel: audit: type=1103 audit(1707788515.438:521): pid=7785 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:55.438000 audit[7785]: CRED_ACQ pid=7785 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:55.602000 audit[7782]: USER_END pid=7782 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:56.061379 kernel: audit: type=1106 audit(1707788515.602:522): pid=7782 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:56.061410 kernel: audit: type=1104 audit(1707788515.602:523): pid=7782 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:55.602000 audit[7782]: CRED_DISP pid=7782 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:41:55.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.7:22-139.178.68.195:54694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:00.605244 systemd[1]: Started sshd@43-147.75.90.7:22-139.178.68.195:48790.service. Feb 13 01:42:00.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.7:22-139.178.68.195:48790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:00.632521 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:42:00.632568 kernel: audit: type=1130 audit(1707788520.604:525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.7:22-139.178.68.195:48790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:00.748000 audit[7847]: USER_ACCT pid=7847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:00.749763 sshd[7847]: Accepted publickey for core from 139.178.68.195 port 48790 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:00.752164 sshd[7847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:00.754474 systemd-logind[1543]: New session 29 of user core. Feb 13 01:42:00.754951 systemd[1]: Started session-29.scope. Feb 13 01:42:00.751000 audit[7847]: CRED_ACQ pid=7847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:00.843650 sshd[7847]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:00.845086 systemd[1]: sshd@43-147.75.90.7:22-139.178.68.195:48790.service: Deactivated successfully. Feb 13 01:42:00.845655 systemd-logind[1543]: Session 29 logged out. Waiting for processes to exit. Feb 13 01:42:00.845700 systemd[1]: session-29.scope: Deactivated successfully. Feb 13 01:42:00.846202 systemd-logind[1543]: Removed session 29. Feb 13 01:42:00.931454 kernel: audit: type=1101 audit(1707788520.748:526): pid=7847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:00.931492 kernel: audit: type=1103 audit(1707788520.751:527): pid=7847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:00.931510 kernel: audit: type=1006 audit(1707788520.751:528): pid=7847 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 13 01:42:00.989940 kernel: audit: type=1300 audit(1707788520.751:528): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6f812e80 a2=3 a3=0 items=0 ppid=1 pid=7847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:00.751000 audit[7847]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6f812e80 a2=3 a3=0 items=0 ppid=1 pid=7847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:01.081918 kernel: audit: type=1327 audit(1707788520.751:528): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:00.751000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:01.112334 kernel: audit: type=1105 audit(1707788520.756:529): pid=7847 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:00.756000 audit[7847]: USER_START pid=7847 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:01.206745 kernel: audit: type=1103 audit(1707788520.756:530): pid=7850 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:00.756000 audit[7850]: CRED_ACQ pid=7850 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:01.295891 kernel: audit: type=1106 audit(1707788520.843:531): pid=7847 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:00.843000 audit[7847]: USER_END pid=7847 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:01.391438 kernel: audit: type=1104 audit(1707788520.843:532): pid=7847 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:00.843000 audit[7847]: CRED_DISP pid=7847 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:00.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.7:22-139.178.68.195:48790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:05.127845 sshd[6955]: Timeout before authentication for 120.53.106.207 port 44616 Feb 13 01:42:05.129210 systemd[1]: sshd@19-147.75.90.7:22-120.53.106.207:44616.service: Deactivated successfully. Feb 13 01:42:05.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.7:22-120.53.106.207:44616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:05.850923 systemd[1]: Started sshd@44-147.75.90.7:22-139.178.68.195:48804.service. Feb 13 01:42:05.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.7:22-139.178.68.195:48804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:05.877827 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:42:05.877901 kernel: audit: type=1130 audit(1707788525.850:535): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.7:22-139.178.68.195:48804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:05.993000 audit[7891]: USER_ACCT pid=7891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:05.994718 sshd[7891]: Accepted publickey for core from 139.178.68.195 port 48804 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:05.996316 sshd[6956]: Timeout before authentication for 14.116.200.5 port 42138 Feb 13 01:42:05.996650 systemd[1]: sshd@20-147.75.90.7:22-14.116.200.5:42138.service: Deactivated successfully. Feb 13 01:42:05.996734 sshd[7891]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:05.999293 systemd-logind[1543]: New session 30 of user core. Feb 13 01:42:06.000045 systemd[1]: Started session-30.scope. Feb 13 01:42:06.078770 sshd[7891]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:06.080232 systemd[1]: sshd@44-147.75.90.7:22-139.178.68.195:48804.service: Deactivated successfully. Feb 13 01:42:06.080900 systemd[1]: session-30.scope: Deactivated successfully. Feb 13 01:42:06.080912 systemd-logind[1543]: Session 30 logged out. Waiting for processes to exit. Feb 13 01:42:06.081437 systemd-logind[1543]: Removed session 30. Feb 13 01:42:05.995000 audit[7891]: CRED_ACQ pid=7891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:06.177391 kernel: audit: type=1101 audit(1707788525.993:536): pid=7891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:06.177439 kernel: audit: type=1103 audit(1707788525.995:537): pid=7891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:06.177458 kernel: audit: type=1006 audit(1707788525.995:538): pid=7891 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 13 01:42:06.235865 kernel: audit: type=1300 audit(1707788525.995:538): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd050a27a0 a2=3 a3=0 items=0 ppid=1 pid=7891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:05.995000 audit[7891]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd050a27a0 a2=3 a3=0 items=0 ppid=1 pid=7891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:06.327797 kernel: audit: type=1327 audit(1707788525.995:538): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:05.995000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:06.358224 kernel: audit: type=1131 audit(1707788525.996:539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.7:22-14.116.200.5:42138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:05.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.7:22-14.116.200.5:42138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:06.445635 kernel: audit: type=1105 audit(1707788526.001:540): pid=7891 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:06.001000 audit[7891]: USER_START pid=7891 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:06.540774 kernel: audit: type=1103 audit(1707788526.002:541): pid=7896 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:06.002000 audit[7896]: CRED_ACQ pid=7896 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:06.629830 kernel: audit: type=1106 audit(1707788526.078:542): pid=7891 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:06.078000 audit[7891]: USER_END pid=7891 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:06.078000 audit[7891]: CRED_DISP pid=7891 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:06.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.7:22-139.178.68.195:48804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:11.085932 systemd[1]: Started sshd@45-147.75.90.7:22-139.178.68.195:35172.service. Feb 13 01:42:11.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.7:22-139.178.68.195:35172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:11.113190 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:42:11.113289 kernel: audit: type=1130 audit(1707788531.085:545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.7:22-139.178.68.195:35172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:11.228000 audit[7921]: USER_ACCT pid=7921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.229231 sshd[7921]: Accepted publickey for core from 139.178.68.195 port 35172 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:11.230902 sshd[7921]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:11.233497 systemd-logind[1543]: New session 31 of user core. Feb 13 01:42:11.234058 systemd[1]: Started session-31.scope. Feb 13 01:42:11.230000 audit[7921]: CRED_ACQ pid=7921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.323235 sshd[7921]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:11.324783 systemd[1]: sshd@45-147.75.90.7:22-139.178.68.195:35172.service: Deactivated successfully. Feb 13 01:42:11.325411 systemd-logind[1543]: Session 31 logged out. Waiting for processes to exit. Feb 13 01:42:11.325418 systemd[1]: session-31.scope: Deactivated successfully. Feb 13 01:42:11.326047 systemd-logind[1543]: Removed session 31. Feb 13 01:42:11.411595 kernel: audit: type=1101 audit(1707788531.228:546): pid=7921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.411646 kernel: audit: type=1103 audit(1707788531.230:547): pid=7921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.411668 kernel: audit: type=1006 audit(1707788531.230:548): pid=7921 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Feb 13 01:42:11.470381 kernel: audit: type=1300 audit(1707788531.230:548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21656a40 a2=3 a3=0 items=0 ppid=1 pid=7921 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:11.230000 audit[7921]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21656a40 a2=3 a3=0 items=0 ppid=1 pid=7921 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:11.562697 kernel: audit: type=1327 audit(1707788531.230:548): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:11.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:11.593211 kernel: audit: type=1105 audit(1707788531.236:549): pid=7921 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.236000 audit[7921]: USER_START pid=7921 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.687945 kernel: audit: type=1103 audit(1707788531.237:550): pid=7924 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.237000 audit[7924]: CRED_ACQ pid=7924 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.323000 audit[7921]: USER_END pid=7921 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.873242 kernel: audit: type=1106 audit(1707788531.323:551): pid=7921 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.873277 kernel: audit: type=1104 audit(1707788531.323:552): pid=7921 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.323000 audit[7921]: CRED_DISP pid=7921 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:11.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.7:22-139.178.68.195:35172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:13.963203 sshd[6960]: Timeout before authentication for 124.221.203.42 port 33060 Feb 13 01:42:13.964901 systemd[1]: sshd@21-147.75.90.7:22-124.221.203.42:33060.service: Deactivated successfully. Feb 13 01:42:13.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.7:22-124.221.203.42:33060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:16.329812 systemd[1]: Started sshd@46-147.75.90.7:22-139.178.68.195:43708.service. Feb 13 01:42:16.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.7:22-139.178.68.195:43708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:16.356534 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:42:16.356604 kernel: audit: type=1130 audit(1707788536.328:555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.7:22-139.178.68.195:43708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:16.472000 audit[7951]: USER_ACCT pid=7951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:16.474238 sshd[7951]: Accepted publickey for core from 139.178.68.195 port 43708 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:16.477865 sshd[7951]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:16.487903 systemd-logind[1543]: New session 32 of user core. Feb 13 01:42:16.490796 systemd[1]: Started session-32.scope. Feb 13 01:42:16.475000 audit[7951]: CRED_ACQ pid=7951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:16.574609 sshd[7951]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:16.576244 systemd[1]: sshd@46-147.75.90.7:22-139.178.68.195:43708.service: Deactivated successfully. Feb 13 01:42:16.577163 systemd-logind[1543]: Session 32 logged out. Waiting for processes to exit. Feb 13 01:42:16.577212 systemd[1]: session-32.scope: Deactivated successfully. Feb 13 01:42:16.577799 systemd-logind[1543]: Removed session 32. Feb 13 01:42:16.657812 kernel: audit: type=1101 audit(1707788536.472:556): pid=7951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:16.657853 kernel: audit: type=1103 audit(1707788536.475:557): pid=7951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:16.657872 kernel: audit: type=1006 audit(1707788536.475:558): pid=7951 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 13 01:42:16.716696 kernel: audit: type=1300 audit(1707788536.475:558): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5e490db0 a2=3 a3=0 items=0 ppid=1 pid=7951 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:16.475000 audit[7951]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5e490db0 a2=3 a3=0 items=0 ppid=1 pid=7951 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:16.475000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:16.839691 kernel: audit: type=1327 audit(1707788536.475:558): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:16.839727 kernel: audit: type=1105 audit(1707788536.495:559): pid=7951 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:16.495000 audit[7951]: USER_START pid=7951 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:16.934576 kernel: audit: type=1103 audit(1707788536.495:560): pid=7954 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:16.495000 audit[7954]: CRED_ACQ pid=7954 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:17.023767 kernel: audit: type=1106 audit(1707788536.573:561): pid=7951 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:16.573000 audit[7951]: USER_END pid=7951 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:17.119260 kernel: audit: type=1104 audit(1707788536.573:562): pid=7951 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:16.573000 audit[7951]: CRED_DISP pid=7951 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:16.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.7:22-139.178.68.195:43708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:21.581608 systemd[1]: Started sshd@47-147.75.90.7:22-139.178.68.195:43712.service. Feb 13 01:42:21.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.7:22-139.178.68.195:43712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:21.608835 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:42:21.608904 kernel: audit: type=1130 audit(1707788541.581:564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.7:22-139.178.68.195:43712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:21.724484 sshd[8015]: Accepted publickey for core from 139.178.68.195 port 43712 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:21.723000 audit[8015]: USER_ACCT pid=8015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:21.725882 sshd[8015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:21.728547 systemd-logind[1543]: New session 33 of user core. Feb 13 01:42:21.729550 systemd[1]: Started session-33.scope. Feb 13 01:42:21.809552 sshd[8015]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:21.811281 systemd[1]: sshd@47-147.75.90.7:22-139.178.68.195:43712.service: Deactivated successfully. Feb 13 01:42:21.812325 systemd-logind[1543]: Session 33 logged out. Waiting for processes to exit. Feb 13 01:42:21.812490 systemd[1]: session-33.scope: Deactivated successfully. Feb 13 01:42:21.813398 systemd-logind[1543]: Removed session 33. Feb 13 01:42:21.725000 audit[8015]: CRED_ACQ pid=8015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:21.908356 kernel: audit: type=1101 audit(1707788541.723:565): pid=8015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:21.908392 kernel: audit: type=1103 audit(1707788541.725:566): pid=8015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:21.908409 kernel: audit: type=1006 audit(1707788541.725:567): pid=8015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Feb 13 01:42:21.725000 audit[8015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe586eaf30 a2=3 a3=0 items=0 ppid=1 pid=8015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:22.058705 kernel: audit: type=1300 audit(1707788541.725:567): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe586eaf30 a2=3 a3=0 items=0 ppid=1 pid=8015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:22.058737 kernel: audit: type=1327 audit(1707788541.725:567): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:21.725000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:22.089119 kernel: audit: type=1105 audit(1707788541.731:568): pid=8015 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:21.731000 audit[8015]: USER_START pid=8015 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:22.183425 kernel: audit: type=1103 audit(1707788541.731:569): pid=8018 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:21.731000 audit[8018]: CRED_ACQ pid=8018 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:22.272604 kernel: audit: type=1106 audit(1707788541.809:570): pid=8015 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:21.809000 audit[8015]: USER_END pid=8015 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:22.367957 kernel: audit: type=1104 audit(1707788541.809:571): pid=8015 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:21.809000 audit[8015]: CRED_DISP pid=8015 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:21.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.7:22-139.178.68.195:43712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:26.815614 systemd[1]: Started sshd@48-147.75.90.7:22-139.178.68.195:33854.service. Feb 13 01:42:26.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.7:22-139.178.68.195:33854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:26.842519 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:42:26.842558 kernel: audit: type=1130 audit(1707788546.815:573): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.7:22-139.178.68.195:33854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:26.958000 audit[8082]: USER_ACCT pid=8082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:26.959494 sshd[8082]: Accepted publickey for core from 139.178.68.195 port 33854 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:26.960629 sshd[8082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:26.962786 systemd-logind[1543]: New session 34 of user core. Feb 13 01:42:26.963434 systemd[1]: Started session-34.scope. Feb 13 01:42:27.042622 sshd[8082]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:27.044074 systemd[1]: sshd@48-147.75.90.7:22-139.178.68.195:33854.service: Deactivated successfully. Feb 13 01:42:27.044632 systemd-logind[1543]: Session 34 logged out. Waiting for processes to exit. Feb 13 01:42:27.044685 systemd[1]: session-34.scope: Deactivated successfully. Feb 13 01:42:27.045221 systemd-logind[1543]: Removed session 34. Feb 13 01:42:26.959000 audit[8082]: CRED_ACQ pid=8082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:27.140997 kernel: audit: type=1101 audit(1707788546.958:574): pid=8082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:27.141080 kernel: audit: type=1103 audit(1707788546.959:575): pid=8082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:27.141102 kernel: audit: type=1006 audit(1707788546.959:576): pid=8082 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Feb 13 01:42:27.199460 kernel: audit: type=1300 audit(1707788546.959:576): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca4c3f1e0 a2=3 a3=0 items=0 ppid=1 pid=8082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:26.959000 audit[8082]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca4c3f1e0 a2=3 a3=0 items=0 ppid=1 pid=8082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:27.291430 kernel: audit: type=1327 audit(1707788546.959:576): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:26.959000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:27.321873 kernel: audit: type=1105 audit(1707788546.964:577): pid=8082 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:26.964000 audit[8082]: USER_START pid=8082 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:27.416440 kernel: audit: type=1103 audit(1707788546.965:578): pid=8085 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:26.965000 audit[8085]: CRED_ACQ pid=8085 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:27.505697 kernel: audit: type=1106 audit(1707788547.042:579): pid=8082 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:27.042000 audit[8082]: USER_END pid=8082 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:27.601107 kernel: audit: type=1104 audit(1707788547.042:580): pid=8082 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:27.042000 audit[8082]: CRED_DISP pid=8082 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:27.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.7:22-139.178.68.195:33854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:32.050076 systemd[1]: Started sshd@49-147.75.90.7:22-139.178.68.195:33858.service. Feb 13 01:42:32.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.7:22-139.178.68.195:33858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:32.077100 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:42:32.077284 kernel: audit: type=1130 audit(1707788552.049:582): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.7:22-139.178.68.195:33858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:32.194000 audit[8132]: USER_ACCT pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.195506 sshd[8132]: Accepted publickey for core from 139.178.68.195 port 33858 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:32.199898 sshd[8132]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:32.204416 systemd-logind[1543]: New session 35 of user core. Feb 13 01:42:32.205109 systemd[1]: Started session-35.scope. Feb 13 01:42:32.283759 sshd[8132]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:32.285221 systemd[1]: sshd@49-147.75.90.7:22-139.178.68.195:33858.service: Deactivated successfully. Feb 13 01:42:32.285848 systemd[1]: session-35.scope: Deactivated successfully. Feb 13 01:42:32.285901 systemd-logind[1543]: Session 35 logged out. Waiting for processes to exit. Feb 13 01:42:32.286396 systemd-logind[1543]: Removed session 35. Feb 13 01:42:32.198000 audit[8132]: CRED_ACQ pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.377899 kernel: audit: type=1101 audit(1707788552.194:583): pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.377968 kernel: audit: type=1103 audit(1707788552.198:584): pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.378004 kernel: audit: type=1006 audit(1707788552.198:585): pid=8132 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Feb 13 01:42:32.198000 audit[8132]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaa2f3110 a2=3 a3=0 items=0 ppid=1 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:32.528386 kernel: audit: type=1300 audit(1707788552.198:585): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaa2f3110 a2=3 a3=0 items=0 ppid=1 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:32.528438 kernel: audit: type=1327 audit(1707788552.198:585): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:32.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:32.206000 audit[8132]: USER_START pid=8132 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.653278 kernel: audit: type=1105 audit(1707788552.206:586): pid=8132 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.653333 kernel: audit: type=1103 audit(1707788552.207:587): pid=8135 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.207000 audit[8135]: CRED_ACQ pid=8135 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.283000 audit[8132]: USER_END pid=8132 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.742623 kernel: audit: type=1106 audit(1707788552.283:588): pid=8132 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.283000 audit[8132]: CRED_DISP pid=8132 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.915063 sshd[7083]: Timeout before authentication for 101.35.252.142 port 36608 Feb 13 01:42:32.915376 systemd[1]: sshd@22-147.75.90.7:22-101.35.252.142:36608.service: Deactivated successfully. Feb 13 01:42:32.927248 kernel: audit: type=1104 audit(1707788552.283:589): pid=8132 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:32.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.7:22-139.178.68.195:33858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:32.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.7:22-101.35.252.142:36608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:37.292066 systemd[1]: Started sshd@50-147.75.90.7:22-139.178.68.195:44990.service. Feb 13 01:42:37.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.7:22-139.178.68.195:44990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:37.319234 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:42:37.319298 kernel: audit: type=1130 audit(1707788557.290:592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.7:22-139.178.68.195:44990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:37.433000 audit[8162]: USER_ACCT pid=8162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:37.435731 sshd[8162]: Accepted publickey for core from 139.178.68.195 port 44990 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:37.436927 sshd[8162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:37.439410 systemd-logind[1543]: New session 36 of user core. Feb 13 01:42:37.439916 systemd[1]: Started session-36.scope. Feb 13 01:42:37.518415 sshd[8162]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:37.519851 systemd[1]: sshd@50-147.75.90.7:22-139.178.68.195:44990.service: Deactivated successfully. Feb 13 01:42:37.520426 systemd-logind[1543]: Session 36 logged out. Waiting for processes to exit. Feb 13 01:42:37.520473 systemd[1]: session-36.scope: Deactivated successfully. Feb 13 01:42:37.521186 systemd-logind[1543]: Removed session 36. Feb 13 01:42:37.435000 audit[8162]: CRED_ACQ pid=8162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:37.617412 kernel: audit: type=1101 audit(1707788557.433:593): pid=8162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:37.617454 kernel: audit: type=1103 audit(1707788557.435:594): pid=8162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:37.617472 kernel: audit: type=1006 audit(1707788557.435:595): pid=8162 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Feb 13 01:42:37.675927 kernel: audit: type=1300 audit(1707788557.435:595): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffcca3700 a2=3 a3=0 items=0 ppid=1 pid=8162 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:37.435000 audit[8162]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffcca3700 a2=3 a3=0 items=0 ppid=1 pid=8162 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:37.767931 kernel: audit: type=1327 audit(1707788557.435:595): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:37.435000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:37.798382 kernel: audit: type=1105 audit(1707788557.440:596): pid=8162 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:37.440000 audit[8162]: USER_START pid=8162 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:37.892823 kernel: audit: type=1103 audit(1707788557.441:597): pid=8165 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:37.441000 audit[8165]: CRED_ACQ pid=8165 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:37.517000 audit[8162]: USER_END pid=8162 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:38.077448 kernel: audit: type=1106 audit(1707788557.517:598): pid=8162 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:38.077480 kernel: audit: type=1104 audit(1707788557.517:599): pid=8162 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:37.517000 audit[8162]: CRED_DISP pid=8162 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:37.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.7:22-139.178.68.195:44990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:42.525557 systemd[1]: Started sshd@51-147.75.90.7:22-139.178.68.195:44998.service. Feb 13 01:42:42.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.7:22-139.178.68.195:44998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:42.552493 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:42:42.552537 kernel: audit: type=1130 audit(1707788562.524:601): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.7:22-139.178.68.195:44998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:42.668000 audit[8191]: USER_ACCT pid=8191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:42.669672 sshd[8191]: Accepted publickey for core from 139.178.68.195 port 44998 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:42.673925 sshd[8191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:42.676271 systemd-logind[1543]: New session 37 of user core. Feb 13 01:42:42.676867 systemd[1]: Started session-37.scope. Feb 13 01:42:42.755973 sshd[8191]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:42.757325 systemd[1]: sshd@51-147.75.90.7:22-139.178.68.195:44998.service: Deactivated successfully. Feb 13 01:42:42.757951 systemd[1]: session-37.scope: Deactivated successfully. Feb 13 01:42:42.757965 systemd-logind[1543]: Session 37 logged out. Waiting for processes to exit. Feb 13 01:42:42.758442 systemd-logind[1543]: Removed session 37. Feb 13 01:42:42.672000 audit[8191]: CRED_ACQ pid=8191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:42.851383 kernel: audit: type=1101 audit(1707788562.668:602): pid=8191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:42.851418 kernel: audit: type=1103 audit(1707788562.672:603): pid=8191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:42.851434 kernel: audit: type=1006 audit(1707788562.672:604): pid=8191 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Feb 13 01:42:42.909894 kernel: audit: type=1300 audit(1707788562.672:604): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffadc38740 a2=3 a3=0 items=0 ppid=1 pid=8191 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:42.672000 audit[8191]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffadc38740 a2=3 a3=0 items=0 ppid=1 pid=8191 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:43.001894 kernel: audit: type=1327 audit(1707788562.672:604): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:42.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:43.032326 kernel: audit: type=1105 audit(1707788562.677:605): pid=8191 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:42.677000 audit[8191]: USER_START pid=8191 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:43.126736 kernel: audit: type=1103 audit(1707788562.677:606): pid=8194 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:42.677000 audit[8194]: CRED_ACQ pid=8194 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:42.755000 audit[8191]: USER_END pid=8191 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:43.311351 kernel: audit: type=1106 audit(1707788562.755:607): pid=8191 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:43.311428 kernel: audit: type=1104 audit(1707788562.755:608): pid=8191 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:42.755000 audit[8191]: CRED_DISP pid=8191 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:42.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.7:22-139.178.68.195:44998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:47.762717 systemd[1]: Started sshd@52-147.75.90.7:22-139.178.68.195:54692.service. Feb 13 01:42:47.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.7:22-139.178.68.195:54692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:47.789836 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:42:47.789922 kernel: audit: type=1130 audit(1707788567.762:610): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.7:22-139.178.68.195:54692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:47.906000 audit[8218]: USER_ACCT pid=8218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:47.906979 sshd[8218]: Accepted publickey for core from 139.178.68.195 port 54692 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:47.908378 sshd[8218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:47.910687 systemd-logind[1543]: New session 38 of user core. Feb 13 01:42:47.911254 systemd[1]: Started session-38.scope. Feb 13 01:42:47.990282 sshd[8218]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:47.991537 systemd[1]: sshd@52-147.75.90.7:22-139.178.68.195:54692.service: Deactivated successfully. Feb 13 01:42:47.992190 systemd-logind[1543]: Session 38 logged out. Waiting for processes to exit. Feb 13 01:42:47.992230 systemd[1]: session-38.scope: Deactivated successfully. Feb 13 01:42:47.992598 systemd-logind[1543]: Removed session 38. Feb 13 01:42:47.907000 audit[8218]: CRED_ACQ pid=8218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:48.089293 kernel: audit: type=1101 audit(1707788567.906:611): pid=8218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:48.089326 kernel: audit: type=1103 audit(1707788567.907:612): pid=8218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:48.089340 kernel: audit: type=1006 audit(1707788567.907:613): pid=8218 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Feb 13 01:42:48.147751 kernel: audit: type=1300 audit(1707788567.907:613): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9df6b9d0 a2=3 a3=0 items=0 ppid=1 pid=8218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:47.907000 audit[8218]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9df6b9d0 a2=3 a3=0 items=0 ppid=1 pid=8218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:48.239697 kernel: audit: type=1327 audit(1707788567.907:613): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:47.907000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:48.270127 kernel: audit: type=1105 audit(1707788567.912:614): pid=8218 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:47.912000 audit[8218]: USER_START pid=8218 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:48.364502 kernel: audit: type=1103 audit(1707788567.913:615): pid=8221 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:47.913000 audit[8221]: CRED_ACQ pid=8221 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:48.453621 kernel: audit: type=1106 audit(1707788567.990:616): pid=8218 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:47.990000 audit[8218]: USER_END pid=8218 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:48.549004 kernel: audit: type=1104 audit(1707788567.990:617): pid=8218 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:47.990000 audit[8218]: CRED_DISP pid=8218 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:47.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.7:22-139.178.68.195:54692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:52.997382 systemd[1]: Started sshd@53-147.75.90.7:22-139.178.68.195:54698.service. Feb 13 01:42:52.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.7:22-139.178.68.195:54698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:53.024439 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:42:53.024509 kernel: audit: type=1130 audit(1707788572.996:619): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.7:22-139.178.68.195:54698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:53.140000 audit[8283]: USER_ACCT pid=8283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.141239 sshd[8283]: Accepted publickey for core from 139.178.68.195 port 54698 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:53.142883 sshd[8283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:53.145364 systemd-logind[1543]: New session 39 of user core. Feb 13 01:42:53.145838 systemd[1]: Started session-39.scope. Feb 13 01:42:53.225461 sshd[8283]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:53.226962 systemd[1]: sshd@53-147.75.90.7:22-139.178.68.195:54698.service: Deactivated successfully. Feb 13 01:42:53.227563 systemd-logind[1543]: Session 39 logged out. Waiting for processes to exit. Feb 13 01:42:53.227600 systemd[1]: session-39.scope: Deactivated successfully. Feb 13 01:42:53.228152 systemd-logind[1543]: Removed session 39. Feb 13 01:42:53.142000 audit[8283]: CRED_ACQ pid=8283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.322911 kernel: audit: type=1101 audit(1707788573.140:620): pid=8283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.322957 kernel: audit: type=1103 audit(1707788573.142:621): pid=8283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.322975 kernel: audit: type=1006 audit(1707788573.142:622): pid=8283 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Feb 13 01:42:53.381483 kernel: audit: type=1300 audit(1707788573.142:622): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd948c5940 a2=3 a3=0 items=0 ppid=1 pid=8283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:53.142000 audit[8283]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd948c5940 a2=3 a3=0 items=0 ppid=1 pid=8283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:53.473469 kernel: audit: type=1327 audit(1707788573.142:622): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:53.142000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:53.503905 kernel: audit: type=1105 audit(1707788573.147:623): pid=8283 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.147000 audit[8283]: USER_START pid=8283 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.598331 kernel: audit: type=1103 audit(1707788573.148:624): pid=8286 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.148000 audit[8286]: CRED_ACQ pid=8286 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.687483 kernel: audit: type=1106 audit(1707788573.225:625): pid=8283 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.225000 audit[8283]: USER_END pid=8283 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.783081 kernel: audit: type=1104 audit(1707788573.225:626): pid=8283 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.225000 audit[8283]: CRED_DISP pid=8283 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:53.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.7:22-139.178.68.195:54698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:57.148822 sshd[7261]: Timeout before authentication for 124.221.203.42 port 40544 Feb 13 01:42:57.150380 systemd[1]: sshd@27-147.75.90.7:22-124.221.203.42:40544.service: Deactivated successfully. Feb 13 01:42:57.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.90.7:22-124.221.203.42:40544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:58.232463 systemd[1]: Started sshd@54-147.75.90.7:22-139.178.68.195:53012.service. Feb 13 01:42:58.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.7:22-139.178.68.195:53012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:58.259419 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:42:58.259485 kernel: audit: type=1130 audit(1707788578.231:629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.7:22-139.178.68.195:53012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:58.377015 sshd[8360]: Accepted publickey for core from 139.178.68.195 port 53012 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:42:58.376000 audit[8360]: USER_ACCT pid=8360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:58.378914 sshd[8360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:42:58.381239 systemd-logind[1543]: New session 40 of user core. Feb 13 01:42:58.381694 systemd[1]: Started session-40.scope. Feb 13 01:42:58.378000 audit[8360]: CRED_ACQ pid=8360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:58.558860 kernel: audit: type=1101 audit(1707788578.376:630): pid=8360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:58.558900 kernel: audit: type=1103 audit(1707788578.378:631): pid=8360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:58.558916 kernel: audit: type=1006 audit(1707788578.378:632): pid=8360 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Feb 13 01:42:58.617410 kernel: audit: type=1300 audit(1707788578.378:632): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff91a59710 a2=3 a3=0 items=0 ppid=1 pid=8360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:58.378000 audit[8360]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff91a59710 a2=3 a3=0 items=0 ppid=1 pid=8360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:42:58.709423 kernel: audit: type=1327 audit(1707788578.378:632): proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:58.378000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:42:58.709645 sshd[8360]: pam_unix(sshd:session): session closed for user core Feb 13 01:42:58.711135 systemd[1]: sshd@54-147.75.90.7:22-139.178.68.195:53012.service: Deactivated successfully. Feb 13 01:42:58.711772 systemd-logind[1543]: Session 40 logged out. Waiting for processes to exit. Feb 13 01:42:58.711780 systemd[1]: session-40.scope: Deactivated successfully. Feb 13 01:42:58.712331 systemd-logind[1543]: Removed session 40. Feb 13 01:42:58.739905 kernel: audit: type=1105 audit(1707788578.383:633): pid=8360 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:58.383000 audit[8360]: USER_START pid=8360 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:58.834510 kernel: audit: type=1103 audit(1707788578.383:634): pid=8363 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:58.383000 audit[8363]: CRED_ACQ pid=8363 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:58.709000 audit[8360]: USER_END pid=8360 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:59.019138 kernel: audit: type=1106 audit(1707788578.709:635): pid=8360 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:59.019170 kernel: audit: type=1104 audit(1707788578.709:636): pid=8360 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:58.709000 audit[8360]: CRED_DISP pid=8360 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:42:58.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.7:22-139.178.68.195:53012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:03.656812 systemd[1]: Started sshd@55-147.75.90.7:22-139.178.68.195:53020.service. Feb 13 01:43:03.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.7:22-139.178.68.195:53020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:03.684008 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:43:03.684062 kernel: audit: type=1130 audit(1707788583.656:638): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.7:22-139.178.68.195:53020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:03.800000 audit[8386]: USER_ACCT pid=8386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:03.801469 sshd[8386]: Accepted publickey for core from 139.178.68.195 port 53020 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:03.805123 sshd[8386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:03.816090 systemd-logind[1543]: New session 41 of user core. Feb 13 01:43:03.818537 systemd[1]: Started session-41.scope. Feb 13 01:43:03.803000 audit[8386]: CRED_ACQ pid=8386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:03.905244 sshd[8386]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:03.906648 systemd[1]: sshd@55-147.75.90.7:22-139.178.68.195:53020.service: Deactivated successfully. Feb 13 01:43:03.907320 systemd[1]: session-41.scope: Deactivated successfully. Feb 13 01:43:03.907324 systemd-logind[1543]: Session 41 logged out. Waiting for processes to exit. Feb 13 01:43:03.907781 systemd-logind[1543]: Removed session 41. Feb 13 01:43:03.983326 kernel: audit: type=1101 audit(1707788583.800:639): pid=8386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:03.983360 kernel: audit: type=1103 audit(1707788583.803:640): pid=8386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:03.983376 kernel: audit: type=1006 audit(1707788583.803:641): pid=8386 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=41 res=1 Feb 13 01:43:04.041849 kernel: audit: type=1300 audit(1707788583.803:641): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff29b1ab70 a2=3 a3=0 items=0 ppid=1 pid=8386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:03.803000 audit[8386]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff29b1ab70 a2=3 a3=0 items=0 ppid=1 pid=8386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:04.133808 kernel: audit: type=1327 audit(1707788583.803:641): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:03.803000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:04.164268 kernel: audit: type=1105 audit(1707788583.827:642): pid=8386 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:03.827000 audit[8386]: USER_START pid=8386 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:04.258702 kernel: audit: type=1103 audit(1707788583.829:643): pid=8389 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:03.829000 audit[8389]: CRED_ACQ pid=8389 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:04.347803 kernel: audit: type=1106 audit(1707788583.905:644): pid=8386 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:03.905000 audit[8386]: USER_END pid=8386 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:04.443231 kernel: audit: type=1104 audit(1707788583.905:645): pid=8386 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:03.905000 audit[8386]: CRED_DISP pid=8386 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:03.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.7:22-139.178.68.195:53020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:08.911669 systemd[1]: Started sshd@56-147.75.90.7:22-139.178.68.195:59466.service. Feb 13 01:43:08.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.7:22-139.178.68.195:59466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:08.938870 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:43:08.938958 kernel: audit: type=1130 audit(1707788588.910:647): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.7:22-139.178.68.195:59466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:09.055000 audit[8414]: USER_ACCT pid=8414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.057602 sshd[8414]: Accepted publickey for core from 139.178.68.195 port 59466 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:09.061289 sshd[8414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:09.066168 systemd-logind[1543]: New session 42 of user core. Feb 13 01:43:09.066624 systemd[1]: Started session-42.scope. Feb 13 01:43:09.146194 sshd[8414]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:09.147672 systemd[1]: sshd@56-147.75.90.7:22-139.178.68.195:59466.service: Deactivated successfully. Feb 13 01:43:09.148264 systemd[1]: session-42.scope: Deactivated successfully. Feb 13 01:43:09.148266 systemd-logind[1543]: Session 42 logged out. Waiting for processes to exit. Feb 13 01:43:09.058000 audit[8414]: CRED_ACQ pid=8414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.148629 systemd-logind[1543]: Removed session 42. Feb 13 01:43:09.238848 kernel: audit: type=1101 audit(1707788589.055:648): pid=8414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.238934 kernel: audit: type=1103 audit(1707788589.058:649): pid=8414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.238981 kernel: audit: type=1006 audit(1707788589.058:650): pid=8414 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=42 res=1 Feb 13 01:43:09.058000 audit[8414]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe880e0150 a2=3 a3=0 items=0 ppid=1 pid=8414 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:09.389399 kernel: audit: type=1300 audit(1707788589.058:650): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe880e0150 a2=3 a3=0 items=0 ppid=1 pid=8414 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:09.389448 kernel: audit: type=1327 audit(1707788589.058:650): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:09.058000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:09.067000 audit[8414]: USER_START pid=8414 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.514229 kernel: audit: type=1105 audit(1707788589.067:651): pid=8414 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.514315 kernel: audit: type=1103 audit(1707788589.067:652): pid=8419 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.067000 audit[8419]: CRED_ACQ pid=8419 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.145000 audit[8414]: USER_END pid=8414 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.603617 kernel: audit: type=1106 audit(1707788589.145:653): pid=8414 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.145000 audit[8414]: CRED_DISP pid=8414 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.788026 kernel: audit: type=1104 audit(1707788589.145:654): pid=8414 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:09.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.7:22-139.178.68.195:59466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:14.152640 systemd[1]: Started sshd@57-147.75.90.7:22-139.178.68.195:59478.service. Feb 13 01:43:14.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.7:22-139.178.68.195:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:14.179618 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:43:14.179697 kernel: audit: type=1130 audit(1707788594.151:656): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.7:22-139.178.68.195:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:14.294000 audit[8444]: USER_ACCT pid=8444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.296105 sshd[8444]: Accepted publickey for core from 139.178.68.195 port 59478 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:14.297250 sshd[8444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:14.299666 systemd-logind[1543]: New session 43 of user core. Feb 13 01:43:14.300206 systemd[1]: Started session-43.scope. Feb 13 01:43:14.295000 audit[8444]: CRED_ACQ pid=8444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.389961 sshd[8444]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:14.391315 systemd[1]: sshd@57-147.75.90.7:22-139.178.68.195:59478.service: Deactivated successfully. Feb 13 01:43:14.391899 systemd-logind[1543]: Session 43 logged out. Waiting for processes to exit. Feb 13 01:43:14.391905 systemd[1]: session-43.scope: Deactivated successfully. Feb 13 01:43:14.392459 systemd-logind[1543]: Removed session 43. Feb 13 01:43:14.477915 kernel: audit: type=1101 audit(1707788594.294:657): pid=8444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.477959 kernel: audit: type=1103 audit(1707788594.295:658): pid=8444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.477979 kernel: audit: type=1006 audit(1707788594.295:659): pid=8444 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=43 res=1 Feb 13 01:43:14.295000 audit[8444]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff209c5b70 a2=3 a3=0 items=0 ppid=1 pid=8444 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:14.628411 kernel: audit: type=1300 audit(1707788594.295:659): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff209c5b70 a2=3 a3=0 items=0 ppid=1 pid=8444 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:14.628444 kernel: audit: type=1327 audit(1707788594.295:659): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:14.295000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:14.300000 audit[8444]: USER_START pid=8444 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.753393 kernel: audit: type=1105 audit(1707788594.300:660): pid=8444 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.753420 kernel: audit: type=1103 audit(1707788594.301:661): pid=8447 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.301000 audit[8447]: CRED_ACQ pid=8447 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.842582 kernel: audit: type=1106 audit(1707788594.388:662): pid=8444 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.388000 audit[8444]: USER_END pid=8444 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.938072 kernel: audit: type=1104 audit(1707788594.389:663): pid=8444 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.389000 audit[8444]: CRED_DISP pid=8444 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:14.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.7:22-139.178.68.195:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:17.988639 update_engine[1545]: I0213 01:43:17.988498 1545 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 01:43:17.988639 update_engine[1545]: I0213 01:43:17.988574 1545 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 01:43:17.990288 update_engine[1545]: I0213 01:43:17.990216 1545 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 01:43:17.991153 update_engine[1545]: I0213 01:43:17.991073 1545 omaha_request_params.cc:62] Current group set to lts Feb 13 01:43:17.991409 update_engine[1545]: I0213 01:43:17.991361 1545 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 01:43:17.991409 update_engine[1545]: I0213 01:43:17.991380 1545 update_attempter.cc:643] Scheduling an action processor start. Feb 13 01:43:17.991409 update_engine[1545]: I0213 01:43:17.991413 1545 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 01:43:17.991786 update_engine[1545]: I0213 01:43:17.991479 1545 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 01:43:17.991786 update_engine[1545]: I0213 01:43:17.991653 1545 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 01:43:17.991786 update_engine[1545]: I0213 01:43:17.991672 1545 omaha_request_action.cc:271] Request: Feb 13 01:43:17.991786 update_engine[1545]: Feb 13 01:43:17.991786 update_engine[1545]: Feb 13 01:43:17.991786 update_engine[1545]: Feb 13 01:43:17.991786 update_engine[1545]: Feb 13 01:43:17.991786 update_engine[1545]: Feb 13 01:43:17.991786 update_engine[1545]: Feb 13 01:43:17.991786 update_engine[1545]: Feb 13 01:43:17.991786 update_engine[1545]: Feb 13 01:43:17.991786 update_engine[1545]: I0213 01:43:17.991683 1545 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 01:43:17.992895 locksmithd[1597]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 01:43:17.994842 update_engine[1545]: I0213 01:43:17.994753 1545 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 01:43:17.995054 update_engine[1545]: E0213 01:43:17.994974 1545 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 01:43:17.995173 update_engine[1545]: I0213 01:43:17.995131 1545 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 01:43:19.396436 systemd[1]: Started sshd@58-147.75.90.7:22-139.178.68.195:54688.service. Feb 13 01:43:19.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.7:22-139.178.68.195:54688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:19.423560 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:43:19.423601 kernel: audit: type=1130 audit(1707788599.395:665): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.7:22-139.178.68.195:54688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:19.539000 audit[8470]: USER_ACCT pid=8470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:19.540164 sshd[8470]: Accepted publickey for core from 139.178.68.195 port 54688 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:19.543923 sshd[8470]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:19.546107 systemd-logind[1543]: New session 44 of user core. Feb 13 01:43:19.546560 systemd[1]: Started session-44.scope. Feb 13 01:43:19.543000 audit[8470]: CRED_ACQ pid=8470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:19.633925 sshd[8470]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:19.635340 systemd[1]: sshd@58-147.75.90.7:22-139.178.68.195:54688.service: Deactivated successfully. Feb 13 01:43:19.635996 systemd[1]: session-44.scope: Deactivated successfully. Feb 13 01:43:19.636008 systemd-logind[1543]: Session 44 logged out. Waiting for processes to exit. Feb 13 01:43:19.636477 systemd-logind[1543]: Removed session 44. Feb 13 01:43:19.722016 kernel: audit: type=1101 audit(1707788599.539:666): pid=8470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:19.722056 kernel: audit: type=1103 audit(1707788599.543:667): pid=8470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:19.722074 kernel: audit: type=1006 audit(1707788599.543:668): pid=8470 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=44 res=1 Feb 13 01:43:19.780604 kernel: audit: type=1300 audit(1707788599.543:668): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc45689560 a2=3 a3=0 items=0 ppid=1 pid=8470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:19.543000 audit[8470]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc45689560 a2=3 a3=0 items=0 ppid=1 pid=8470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:19.872699 kernel: audit: type=1327 audit(1707788599.543:668): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:19.543000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:19.547000 audit[8470]: USER_START pid=8470 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:19.997685 kernel: audit: type=1105 audit(1707788599.547:669): pid=8470 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:19.997717 kernel: audit: type=1103 audit(1707788599.547:670): pid=8473 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:19.547000 audit[8473]: CRED_ACQ pid=8473 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:20.086888 kernel: audit: type=1106 audit(1707788599.632:671): pid=8470 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:19.632000 audit[8470]: USER_END pid=8470 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:19.633000 audit[8470]: CRED_DISP pid=8470 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:20.271775 kernel: audit: type=1104 audit(1707788599.633:672): pid=8470 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:19.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.7:22-139.178.68.195:54688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:24.641141 systemd[1]: Started sshd@59-147.75.90.7:22-139.178.68.195:54702.service. Feb 13 01:43:24.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.7:22-139.178.68.195:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:24.667888 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:43:24.667993 kernel: audit: type=1130 audit(1707788604.640:674): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.7:22-139.178.68.195:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:24.783000 audit[8533]: USER_ACCT pid=8533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:24.784120 sshd[8533]: Accepted publickey for core from 139.178.68.195 port 54702 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:24.787031 sshd[8533]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:24.791874 systemd-logind[1543]: New session 45 of user core. Feb 13 01:43:24.792416 systemd[1]: Started session-45.scope. Feb 13 01:43:24.874997 sshd[8533]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:24.876344 systemd[1]: sshd@59-147.75.90.7:22-139.178.68.195:54702.service: Deactivated successfully. Feb 13 01:43:24.785000 audit[8533]: CRED_ACQ pid=8533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:24.877030 systemd[1]: session-45.scope: Deactivated successfully. Feb 13 01:43:24.877073 systemd-logind[1543]: Session 45 logged out. Waiting for processes to exit. Feb 13 01:43:24.877534 systemd-logind[1543]: Removed session 45. Feb 13 01:43:24.967264 kernel: audit: type=1101 audit(1707788604.783:675): pid=8533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:24.967301 kernel: audit: type=1103 audit(1707788604.785:676): pid=8533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:24.967338 kernel: audit: type=1006 audit(1707788604.785:677): pid=8533 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=45 res=1 Feb 13 01:43:25.025853 kernel: audit: type=1300 audit(1707788604.785:677): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecd722990 a2=3 a3=0 items=0 ppid=1 pid=8533 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:24.785000 audit[8533]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecd722990 a2=3 a3=0 items=0 ppid=1 pid=8533 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:25.117898 kernel: audit: type=1327 audit(1707788604.785:677): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:24.785000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:25.148363 kernel: audit: type=1105 audit(1707788604.793:678): pid=8533 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:24.793000 audit[8533]: USER_START pid=8533 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:25.242849 kernel: audit: type=1103 audit(1707788604.794:679): pid=8536 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:24.794000 audit[8536]: CRED_ACQ pid=8536 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:25.332022 kernel: audit: type=1106 audit(1707788604.875:680): pid=8533 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:24.875000 audit[8533]: USER_END pid=8533 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:25.427495 kernel: audit: type=1104 audit(1707788604.875:681): pid=8533 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:24.875000 audit[8533]: CRED_DISP pid=8533 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:24.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.7:22-139.178.68.195:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:27.986983 update_engine[1545]: I0213 01:43:27.986869 1545 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 01:43:27.987923 update_engine[1545]: I0213 01:43:27.987339 1545 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 01:43:27.987923 update_engine[1545]: E0213 01:43:27.987538 1545 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 01:43:27.987923 update_engine[1545]: I0213 01:43:27.987746 1545 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 01:43:29.881391 systemd[1]: Started sshd@60-147.75.90.7:22-139.178.68.195:60988.service. Feb 13 01:43:29.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.7:22-139.178.68.195:60988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:29.908140 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:43:29.908195 kernel: audit: type=1130 audit(1707788609.880:683): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.7:22-139.178.68.195:60988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:30.023000 audit[8627]: USER_ACCT pid=8627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.024299 sshd[8627]: Accepted publickey for core from 139.178.68.195 port 60988 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:30.027388 sshd[8627]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:30.031918 systemd-logind[1543]: New session 46 of user core. Feb 13 01:43:30.032296 systemd[1]: Started session-46.scope. Feb 13 01:43:30.110288 sshd[8627]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:30.111630 systemd[1]: sshd@60-147.75.90.7:22-139.178.68.195:60988.service: Deactivated successfully. Feb 13 01:43:30.112296 systemd-logind[1543]: Session 46 logged out. Waiting for processes to exit. Feb 13 01:43:30.112297 systemd[1]: session-46.scope: Deactivated successfully. Feb 13 01:43:30.112764 systemd-logind[1543]: Removed session 46. Feb 13 01:43:30.026000 audit[8627]: CRED_ACQ pid=8627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.115618 kernel: audit: type=1101 audit(1707788610.023:684): pid=8627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.115657 kernel: audit: type=1103 audit(1707788610.026:685): pid=8627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.160701 systemd[1]: Started sshd@61-147.75.90.7:22-205.210.31.235:51718.service. Feb 13 01:43:30.264602 kernel: audit: type=1006 audit(1707788610.026:686): pid=8627 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=46 res=1 Feb 13 01:43:30.264642 kernel: audit: type=1300 audit(1707788610.026:686): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf59b4650 a2=3 a3=0 items=0 ppid=1 pid=8627 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:30.026000 audit[8627]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf59b4650 a2=3 a3=0 items=0 ppid=1 pid=8627 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:30.356599 kernel: audit: type=1327 audit(1707788610.026:686): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:30.026000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:30.387043 kernel: audit: type=1105 audit(1707788610.033:687): pid=8627 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.033000 audit[8627]: USER_START pid=8627 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.481512 kernel: audit: type=1103 audit(1707788610.034:688): pid=8630 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.034000 audit[8630]: CRED_ACQ pid=8630 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.483641 sshd[8653]: kex_exchange_identification: Connection closed by remote host Feb 13 01:43:30.483641 sshd[8653]: Connection closed by 205.210.31.235 port 51718 Feb 13 01:43:30.483890 systemd[1]: sshd@61-147.75.90.7:22-205.210.31.235:51718.service: Deactivated successfully. Feb 13 01:43:30.110000 audit[8627]: USER_END pid=8627 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.666115 kernel: audit: type=1106 audit(1707788610.110:689): pid=8627 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.666155 kernel: audit: type=1104 audit(1707788610.110:690): pid=8627 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.110000 audit[8627]: CRED_DISP pid=8627 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:30.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.7:22-139.178.68.195:60988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:30.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.90.7:22-205.210.31.235:51718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:30.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.90.7:22-205.210.31.235:51718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:35.117185 systemd[1]: Started sshd@62-147.75.90.7:22-139.178.68.195:32770.service. Feb 13 01:43:35.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.7:22-139.178.68.195:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:35.144277 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 01:43:35.144377 kernel: audit: type=1130 audit(1707788615.116:694): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.7:22-139.178.68.195:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:35.260000 audit[8656]: USER_ACCT pid=8656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.261025 sshd[8656]: Accepted publickey for core from 139.178.68.195 port 32770 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:35.263008 sshd[8656]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:35.268251 systemd-logind[1543]: New session 47 of user core. Feb 13 01:43:35.268694 systemd[1]: Started session-47.scope. Feb 13 01:43:35.349098 sshd[8656]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:35.350702 systemd[1]: sshd@62-147.75.90.7:22-139.178.68.195:32770.service: Deactivated successfully. Feb 13 01:43:35.351533 systemd-logind[1543]: Session 47 logged out. Waiting for processes to exit. Feb 13 01:43:35.351564 systemd[1]: session-47.scope: Deactivated successfully. Feb 13 01:43:35.352425 systemd-logind[1543]: Removed session 47. Feb 13 01:43:35.261000 audit[8656]: CRED_ACQ pid=8656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.445834 kernel: audit: type=1101 audit(1707788615.260:695): pid=8656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.445888 kernel: audit: type=1103 audit(1707788615.261:696): pid=8656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.445909 kernel: audit: type=1006 audit(1707788615.261:697): pid=8656 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=47 res=1 Feb 13 01:43:35.504379 kernel: audit: type=1300 audit(1707788615.261:697): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb281b4c0 a2=3 a3=0 items=0 ppid=1 pid=8656 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:35.261000 audit[8656]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb281b4c0 a2=3 a3=0 items=0 ppid=1 pid=8656 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:35.261000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:35.626839 kernel: audit: type=1327 audit(1707788615.261:697): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:35.626871 kernel: audit: type=1105 audit(1707788615.270:698): pid=8656 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.270000 audit[8656]: USER_START pid=8656 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.271000 audit[8659]: CRED_ACQ pid=8659 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.721697 kernel: audit: type=1103 audit(1707788615.271:699): pid=8659 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.349000 audit[8656]: USER_END pid=8656 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.906132 kernel: audit: type=1106 audit(1707788615.349:700): pid=8656 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.906163 kernel: audit: type=1104 audit(1707788615.349:701): pid=8656 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.349000 audit[8656]: CRED_DISP pid=8656 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:35.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.7:22-139.178.68.195:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:37.986854 update_engine[1545]: I0213 01:43:37.986734 1545 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 01:43:37.987783 update_engine[1545]: I0213 01:43:37.987203 1545 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 01:43:37.987783 update_engine[1545]: E0213 01:43:37.987399 1545 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 01:43:37.987783 update_engine[1545]: I0213 01:43:37.987571 1545 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 01:43:40.356095 systemd[1]: Started sshd@63-147.75.90.7:22-139.178.68.195:37222.service. Feb 13 01:43:40.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.7:22-139.178.68.195:37222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:40.382777 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:43:40.382867 kernel: audit: type=1130 audit(1707788620.355:703): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.7:22-139.178.68.195:37222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:40.498000 audit[8699]: USER_ACCT pid=8699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:40.499223 sshd[8699]: Accepted publickey for core from 139.178.68.195 port 37222 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:40.501351 sshd[8699]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:40.506285 systemd-logind[1543]: New session 48 of user core. Feb 13 01:43:40.506848 systemd[1]: Started session-48.scope. Feb 13 01:43:40.585369 sshd[8699]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:40.586765 systemd[1]: sshd@63-147.75.90.7:22-139.178.68.195:37222.service: Deactivated successfully. Feb 13 01:43:40.587326 systemd-logind[1543]: Session 48 logged out. Waiting for processes to exit. Feb 13 01:43:40.587368 systemd[1]: session-48.scope: Deactivated successfully. Feb 13 01:43:40.587822 systemd-logind[1543]: Removed session 48. Feb 13 01:43:40.500000 audit[8699]: CRED_ACQ pid=8699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:40.681898 kernel: audit: type=1101 audit(1707788620.498:704): pid=8699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:40.681939 kernel: audit: type=1103 audit(1707788620.500:705): pid=8699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:40.681956 kernel: audit: type=1006 audit(1707788620.500:706): pid=8699 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=48 res=1 Feb 13 01:43:40.740466 kernel: audit: type=1300 audit(1707788620.500:706): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9b52b220 a2=3 a3=0 items=0 ppid=1 pid=8699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:40.500000 audit[8699]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9b52b220 a2=3 a3=0 items=0 ppid=1 pid=8699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:40.832561 kernel: audit: type=1327 audit(1707788620.500:706): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:40.500000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:40.863027 kernel: audit: type=1105 audit(1707788620.508:707): pid=8699 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:40.508000 audit[8699]: USER_START pid=8699 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:40.957780 kernel: audit: type=1103 audit(1707788620.509:708): pid=8703 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:40.509000 audit[8703]: CRED_ACQ pid=8703 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:40.585000 audit[8699]: USER_END pid=8699 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:41.142417 kernel: audit: type=1106 audit(1707788620.585:709): pid=8699 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:41.142448 kernel: audit: type=1104 audit(1707788620.585:710): pid=8699 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:40.585000 audit[8699]: CRED_DISP pid=8699 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:40.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.7:22-139.178.68.195:37222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:45.591363 systemd[1]: Started sshd@64-147.75.90.7:22-139.178.68.195:37236.service. Feb 13 01:43:45.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.7:22-139.178.68.195:37236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:45.618423 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:43:45.618480 kernel: audit: type=1130 audit(1707788625.590:712): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.7:22-139.178.68.195:37236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:45.733000 audit[8726]: USER_ACCT pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:45.734415 sshd[8726]: Accepted publickey for core from 139.178.68.195 port 37236 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:45.735030 sshd[8726]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:45.737367 systemd-logind[1543]: New session 49 of user core. Feb 13 01:43:45.737793 systemd[1]: Started session-49.scope. Feb 13 01:43:45.817248 sshd[8726]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:45.818607 systemd[1]: sshd@64-147.75.90.7:22-139.178.68.195:37236.service: Deactivated successfully. Feb 13 01:43:45.819246 systemd-logind[1543]: Session 49 logged out. Waiting for processes to exit. Feb 13 01:43:45.819275 systemd[1]: session-49.scope: Deactivated successfully. Feb 13 01:43:45.819719 systemd-logind[1543]: Removed session 49. Feb 13 01:43:45.734000 audit[8726]: CRED_ACQ pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:45.916246 kernel: audit: type=1101 audit(1707788625.733:713): pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:45.916284 kernel: audit: type=1103 audit(1707788625.734:714): pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:45.916300 kernel: audit: type=1006 audit(1707788625.734:715): pid=8726 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=49 res=1 Feb 13 01:43:45.974807 kernel: audit: type=1300 audit(1707788625.734:715): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc5ee8750 a2=3 a3=0 items=0 ppid=1 pid=8726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:45.734000 audit[8726]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc5ee8750 a2=3 a3=0 items=0 ppid=1 pid=8726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:46.066886 kernel: audit: type=1327 audit(1707788625.734:715): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:45.734000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:46.097345 kernel: audit: type=1105 audit(1707788625.739:716): pid=8726 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:45.739000 audit[8726]: USER_START pid=8726 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:46.191856 kernel: audit: type=1103 audit(1707788625.739:717): pid=8729 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:45.739000 audit[8729]: CRED_ACQ pid=8729 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:46.281077 kernel: audit: type=1106 audit(1707788625.817:718): pid=8726 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:45.817000 audit[8726]: USER_END pid=8726 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:46.376585 kernel: audit: type=1104 audit(1707788625.817:719): pid=8726 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:45.817000 audit[8726]: CRED_DISP pid=8726 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:45.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.7:22-139.178.68.195:37236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:47.188163 systemd[1]: Started sshd@65-147.75.90.7:22-185.196.8.151:47336.service. Feb 13 01:43:47.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.90.7:22-185.196.8.151:47336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:47.345045 sshd[8751]: kex_exchange_identification: Connection closed by remote host Feb 13 01:43:47.345045 sshd[8751]: Connection closed by 185.196.8.151 port 47336 Feb 13 01:43:47.346428 systemd[1]: sshd@65-147.75.90.7:22-185.196.8.151:47336.service: Deactivated successfully. Feb 13 01:43:47.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.90.7:22-185.196.8.151:47336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:47.986369 update_engine[1545]: I0213 01:43:47.986253 1545 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 01:43:47.987359 update_engine[1545]: I0213 01:43:47.986768 1545 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 01:43:47.987359 update_engine[1545]: E0213 01:43:47.986974 1545 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 01:43:47.987359 update_engine[1545]: I0213 01:43:47.987133 1545 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 01:43:47.987359 update_engine[1545]: I0213 01:43:47.987149 1545 omaha_request_action.cc:621] Omaha request response: Feb 13 01:43:47.987359 update_engine[1545]: E0213 01:43:47.987311 1545 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 01:43:47.987359 update_engine[1545]: I0213 01:43:47.987340 1545 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 01:43:47.987359 update_engine[1545]: I0213 01:43:47.987350 1545 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 01:43:47.987359 update_engine[1545]: I0213 01:43:47.987360 1545 update_attempter.cc:306] Processing Done. Feb 13 01:43:47.988276 update_engine[1545]: E0213 01:43:47.987385 1545 update_attempter.cc:619] Update failed. Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.987396 1545 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.987404 1545 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.987413 1545 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.987561 1545 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.987629 1545 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.987639 1545 omaha_request_action.cc:271] Request: Feb 13 01:43:47.988276 update_engine[1545]: Feb 13 01:43:47.988276 update_engine[1545]: Feb 13 01:43:47.988276 update_engine[1545]: Feb 13 01:43:47.988276 update_engine[1545]: Feb 13 01:43:47.988276 update_engine[1545]: Feb 13 01:43:47.988276 update_engine[1545]: Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.987649 1545 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.987955 1545 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 01:43:47.988276 update_engine[1545]: E0213 01:43:47.988113 1545 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.988257 1545 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.988271 1545 omaha_request_action.cc:621] Omaha request response: Feb 13 01:43:47.988276 update_engine[1545]: I0213 01:43:47.988281 1545 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 01:43:47.990056 locksmithd[1597]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 01:43:47.990056 locksmithd[1597]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 01:43:47.990803 update_engine[1545]: I0213 01:43:47.988291 1545 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 01:43:47.990803 update_engine[1545]: I0213 01:43:47.988298 1545 update_attempter.cc:306] Processing Done. Feb 13 01:43:47.990803 update_engine[1545]: I0213 01:43:47.988306 1545 update_attempter.cc:310] Error event sent. Feb 13 01:43:47.990803 update_engine[1545]: I0213 01:43:47.988328 1545 update_check_scheduler.cc:74] Next update check in 41m37s Feb 13 01:43:50.824512 systemd[1]: Started sshd@66-147.75.90.7:22-139.178.68.195:51760.service. Feb 13 01:43:50.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.7:22-139.178.68.195:51760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:50.851660 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 01:43:50.851727 kernel: audit: type=1130 audit(1707788630.824:723): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.7:22-139.178.68.195:51760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:50.968000 audit[8794]: USER_ACCT pid=8794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:50.969261 sshd[8794]: Accepted publickey for core from 139.178.68.195 port 51760 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:50.969814 sshd[8794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:50.972206 systemd-logind[1543]: New session 50 of user core. Feb 13 01:43:50.972669 systemd[1]: Started session-50.scope. Feb 13 01:43:50.969000 audit[8794]: CRED_ACQ pid=8794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:51.065140 sshd[8794]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:51.066506 systemd[1]: sshd@66-147.75.90.7:22-139.178.68.195:51760.service: Deactivated successfully. Feb 13 01:43:51.067184 systemd[1]: session-50.scope: Deactivated successfully. Feb 13 01:43:51.067225 systemd-logind[1543]: Session 50 logged out. Waiting for processes to exit. Feb 13 01:43:51.067624 systemd-logind[1543]: Removed session 50. Feb 13 01:43:51.152698 kernel: audit: type=1101 audit(1707788630.968:724): pid=8794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:51.152738 kernel: audit: type=1103 audit(1707788630.969:725): pid=8794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:51.152756 kernel: audit: type=1006 audit(1707788630.969:726): pid=8794 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=50 res=1 Feb 13 01:43:51.211261 kernel: audit: type=1300 audit(1707788630.969:726): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2d72cd80 a2=3 a3=0 items=0 ppid=1 pid=8794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:50.969000 audit[8794]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2d72cd80 a2=3 a3=0 items=0 ppid=1 pid=8794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:51.303289 kernel: audit: type=1327 audit(1707788630.969:726): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:50.969000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:51.333751 kernel: audit: type=1105 audit(1707788630.974:727): pid=8794 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:50.974000 audit[8794]: USER_START pid=8794 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:51.428320 kernel: audit: type=1103 audit(1707788630.974:728): pid=8797 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:50.974000 audit[8797]: CRED_ACQ pid=8797 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:51.517501 kernel: audit: type=1106 audit(1707788631.065:729): pid=8794 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:51.065000 audit[8794]: USER_END pid=8794 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:51.612966 kernel: audit: type=1104 audit(1707788631.065:730): pid=8794 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:51.065000 audit[8794]: CRED_DISP pid=8794 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:51.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.7:22-139.178.68.195:51760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:52.596061 systemd[1]: Started sshd@67-147.75.90.7:22-124.221.203.42:42218.service. Feb 13 01:43:52.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.90.7:22-124.221.203.42:42218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:56.071946 systemd[1]: Started sshd@68-147.75.90.7:22-139.178.68.195:39850.service. Feb 13 01:43:56.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.7:22-139.178.68.195:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:56.099221 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:43:56.099329 kernel: audit: type=1130 audit(1707788636.071:733): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.7:22-139.178.68.195:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:56.215035 sshd[8822]: Accepted publickey for core from 139.178.68.195 port 39850 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:43:56.214000 audit[8822]: USER_ACCT pid=8822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.215892 sshd[8822]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:43:56.218302 systemd-logind[1543]: New session 51 of user core. Feb 13 01:43:56.218725 systemd[1]: Started session-51.scope. Feb 13 01:43:56.258255 systemd[1]: Started sshd@69-147.75.90.7:22-185.196.8.151:40660.service. Feb 13 01:43:56.215000 audit[8822]: CRED_ACQ pid=8822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.308808 sshd[8822]: pam_unix(sshd:session): session closed for user core Feb 13 01:43:56.310209 systemd[1]: sshd@68-147.75.90.7:22-139.178.68.195:39850.service: Deactivated successfully. Feb 13 01:43:56.310923 systemd[1]: session-51.scope: Deactivated successfully. Feb 13 01:43:56.310932 systemd-logind[1543]: Session 51 logged out. Waiting for processes to exit. Feb 13 01:43:56.311431 systemd-logind[1543]: Removed session 51. Feb 13 01:43:56.396944 kernel: audit: type=1101 audit(1707788636.214:734): pid=8822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.397030 kernel: audit: type=1103 audit(1707788636.215:735): pid=8822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.397047 kernel: audit: type=1006 audit(1707788636.215:736): pid=8822 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=51 res=1 Feb 13 01:43:56.446538 sshd[8846]: Unable to negotiate with 185.196.8.151 port 40660: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 01:43:56.446926 systemd[1]: sshd@69-147.75.90.7:22-185.196.8.151:40660.service: Deactivated successfully. Feb 13 01:43:56.455542 kernel: audit: type=1300 audit(1707788636.215:736): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe42752320 a2=3 a3=0 items=0 ppid=1 pid=8822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:56.215000 audit[8822]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe42752320 a2=3 a3=0 items=0 ppid=1 pid=8822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:43:56.547701 kernel: audit: type=1327 audit(1707788636.215:736): proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:56.215000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:43:56.578113 kernel: audit: type=1105 audit(1707788636.220:737): pid=8822 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.220000 audit[8822]: USER_START pid=8822 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.672649 kernel: audit: type=1103 audit(1707788636.220:738): pid=8845 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.220000 audit[8845]: CRED_ACQ pid=8845 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.761893 kernel: audit: type=1130 audit(1707788636.257:739): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.7:22-185.196.8.151:40660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:56.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.7:22-185.196.8.151:40660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:56.850354 kernel: audit: type=1106 audit(1707788636.308:740): pid=8822 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.308000 audit[8822]: USER_END pid=8822 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.308000 audit[8822]: CRED_DISP pid=8822 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:43:56.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.7:22-139.178.68.195:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:56.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.7:22-185.196.8.151:40660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:57.969903 systemd[1]: Started sshd@70-147.75.90.7:22-104.250.49.155:48824.service. Feb 13 01:43:57.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.90.7:22-104.250.49.155:48824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:57.975495 sshd[8900]: Connection closed by 104.250.49.155 port 48824 [preauth] Feb 13 01:43:57.975787 systemd[1]: sshd@70-147.75.90.7:22-104.250.49.155:48824.service: Deactivated successfully. Feb 13 01:43:57.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.90.7:22-104.250.49.155:48824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:01.315667 systemd[1]: Started sshd@71-147.75.90.7:22-139.178.68.195:39860.service. Feb 13 01:44:01.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.7:22-139.178.68.195:39860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:01.342842 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 01:44:01.342926 kernel: audit: type=1130 audit(1707788641.314:746): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.7:22-139.178.68.195:39860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:01.459000 audit[8906]: USER_ACCT pid=8906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:01.461403 sshd[8906]: Accepted publickey for core from 139.178.68.195 port 39860 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:01.464896 sshd[8906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:01.469893 systemd-logind[1543]: New session 52 of user core. Feb 13 01:44:01.470321 systemd[1]: Started session-52.scope. Feb 13 01:44:01.550396 sshd[8906]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:01.551834 systemd[1]: sshd@71-147.75.90.7:22-139.178.68.195:39860.service: Deactivated successfully. Feb 13 01:44:01.552395 systemd-logind[1543]: Session 52 logged out. Waiting for processes to exit. Feb 13 01:44:01.552429 systemd[1]: session-52.scope: Deactivated successfully. Feb 13 01:44:01.462000 audit[8906]: CRED_ACQ pid=8906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:01.552960 systemd-logind[1543]: Removed session 52. Feb 13 01:44:01.643931 kernel: audit: type=1101 audit(1707788641.459:747): pid=8906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:01.643968 kernel: audit: type=1103 audit(1707788641.462:748): pid=8906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:01.643984 kernel: audit: type=1006 audit(1707788641.462:749): pid=8906 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=52 res=1 Feb 13 01:44:01.702775 kernel: audit: type=1300 audit(1707788641.462:749): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf786af20 a2=3 a3=0 items=0 ppid=1 pid=8906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:01.462000 audit[8906]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf786af20 a2=3 a3=0 items=0 ppid=1 pid=8906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:01.795270 kernel: audit: type=1327 audit(1707788641.462:749): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:01.462000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:01.825869 kernel: audit: type=1105 audit(1707788641.470:750): pid=8906 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:01.470000 audit[8906]: USER_START pid=8906 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:01.920806 kernel: audit: type=1103 audit(1707788641.471:751): pid=8909 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:01.471000 audit[8909]: CRED_ACQ pid=8909 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:02.010439 kernel: audit: type=1106 audit(1707788641.549:752): pid=8906 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:01.549000 audit[8906]: USER_END pid=8906 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:02.106506 kernel: audit: type=1104 audit(1707788641.549:753): pid=8906 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:01.549000 audit[8906]: CRED_DISP pid=8906 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:01.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.7:22-139.178.68.195:39860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:06.555423 systemd[1]: Started sshd@72-147.75.90.7:22-139.178.68.195:56038.service. Feb 13 01:44:06.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.7:22-139.178.68.195:56038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:06.582416 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:44:06.582492 kernel: audit: type=1130 audit(1707788646.553:755): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.7:22-139.178.68.195:56038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:06.698000 audit[8934]: USER_ACCT pid=8934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:06.700379 sshd[8934]: Accepted publickey for core from 139.178.68.195 port 56038 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:06.703951 sshd[8934]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:06.708995 systemd-logind[1543]: New session 53 of user core. Feb 13 01:44:06.709396 systemd[1]: Started session-53.scope. Feb 13 01:44:06.787805 sshd[8934]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:06.789266 systemd[1]: sshd@72-147.75.90.7:22-139.178.68.195:56038.service: Deactivated successfully. Feb 13 01:44:06.789926 systemd[1]: session-53.scope: Deactivated successfully. Feb 13 01:44:06.789943 systemd-logind[1543]: Session 53 logged out. Waiting for processes to exit. Feb 13 01:44:06.790430 systemd-logind[1543]: Removed session 53. Feb 13 01:44:06.701000 audit[8934]: CRED_ACQ pid=8934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:06.882824 kernel: audit: type=1101 audit(1707788646.698:756): pid=8934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:06.882881 kernel: audit: type=1103 audit(1707788646.701:757): pid=8934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:06.882920 kernel: audit: type=1006 audit(1707788646.701:758): pid=8934 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=53 res=1 Feb 13 01:44:06.701000 audit[8934]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5ee8d6d0 a2=3 a3=0 items=0 ppid=1 pid=8934 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:07.034094 kernel: audit: type=1300 audit(1707788646.701:758): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5ee8d6d0 a2=3 a3=0 items=0 ppid=1 pid=8934 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:07.034139 kernel: audit: type=1327 audit(1707788646.701:758): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:06.701000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:06.709000 audit[8934]: USER_START pid=8934 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:07.159589 kernel: audit: type=1105 audit(1707788646.709:759): pid=8934 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:07.159658 kernel: audit: type=1103 audit(1707788646.710:760): pid=8941 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:06.710000 audit[8941]: CRED_ACQ pid=8941 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:06.786000 audit[8934]: USER_END pid=8934 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:07.344180 kernel: audit: type=1106 audit(1707788646.786:761): pid=8934 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:07.344258 kernel: audit: type=1104 audit(1707788646.786:762): pid=8934 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:06.786000 audit[8934]: CRED_DISP pid=8934 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:06.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.7:22-139.178.68.195:56038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:11.795061 systemd[1]: Started sshd@73-147.75.90.7:22-139.178.68.195:56044.service. Feb 13 01:44:11.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.7:22-139.178.68.195:56044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:11.821971 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:44:11.822083 kernel: audit: type=1130 audit(1707788651.793:764): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.7:22-139.178.68.195:56044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:11.938541 sshd[8967]: Accepted publickey for core from 139.178.68.195 port 56044 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:11.936000 audit[8967]: USER_ACCT pid=8967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:11.939881 sshd[8967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:11.942239 systemd-logind[1543]: New session 54 of user core. Feb 13 01:44:11.942716 systemd[1]: Started session-54.scope. Feb 13 01:44:12.024306 sshd[8967]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:12.025616 systemd[1]: sshd@73-147.75.90.7:22-139.178.68.195:56044.service: Deactivated successfully. Feb 13 01:44:12.026275 systemd-logind[1543]: Session 54 logged out. Waiting for processes to exit. Feb 13 01:44:12.026312 systemd[1]: session-54.scope: Deactivated successfully. Feb 13 01:44:12.026830 systemd-logind[1543]: Removed session 54. Feb 13 01:44:11.938000 audit[8967]: CRED_ACQ pid=8967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:12.122577 kernel: audit: type=1101 audit(1707788651.936:765): pid=8967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:12.122644 kernel: audit: type=1103 audit(1707788651.938:766): pid=8967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:12.122689 kernel: audit: type=1006 audit(1707788651.938:767): pid=8967 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=54 res=1 Feb 13 01:44:11.938000 audit[8967]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe06254080 a2=3 a3=0 items=0 ppid=1 pid=8967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:12.273046 kernel: audit: type=1300 audit(1707788651.938:767): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe06254080 a2=3 a3=0 items=0 ppid=1 pid=8967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:12.273104 kernel: audit: type=1327 audit(1707788651.938:767): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:11.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:11.943000 audit[8967]: USER_START pid=8967 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:12.397892 kernel: audit: type=1105 audit(1707788651.943:768): pid=8967 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:12.397958 kernel: audit: type=1103 audit(1707788651.943:769): pid=8970 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:11.943000 audit[8970]: CRED_ACQ pid=8970 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:12.023000 audit[8967]: USER_END pid=8967 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:12.582464 kernel: audit: type=1106 audit(1707788652.023:770): pid=8967 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:12.582516 kernel: audit: type=1104 audit(1707788652.023:771): pid=8967 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:12.023000 audit[8967]: CRED_DISP pid=8967 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:12.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.7:22-139.178.68.195:56044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:17.030604 systemd[1]: Started sshd@74-147.75.90.7:22-139.178.68.195:39034.service. Feb 13 01:44:17.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.7:22-139.178.68.195:39034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:17.057406 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:44:17.057536 kernel: audit: type=1130 audit(1707788657.029:773): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.7:22-139.178.68.195:39034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:17.173104 sshd[8992]: Accepted publickey for core from 139.178.68.195 port 39034 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:17.171000 audit[8992]: USER_ACCT pid=8992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.175136 sshd[8992]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:17.177552 systemd-logind[1543]: New session 55 of user core. Feb 13 01:44:17.178236 systemd[1]: Started session-55.scope. Feb 13 01:44:17.260676 sshd[8992]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:17.262531 systemd[1]: Started sshd@75-147.75.90.7:22-139.178.68.195:39038.service. Feb 13 01:44:17.262839 systemd[1]: sshd@74-147.75.90.7:22-139.178.68.195:39034.service: Deactivated successfully. Feb 13 01:44:17.263387 systemd-logind[1543]: Session 55 logged out. Waiting for processes to exit. Feb 13 01:44:17.263440 systemd[1]: session-55.scope: Deactivated successfully. Feb 13 01:44:17.263984 systemd-logind[1543]: Removed session 55. Feb 13 01:44:17.173000 audit[8992]: CRED_ACQ pid=8992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.357471 kernel: audit: type=1101 audit(1707788657.171:774): pid=8992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.357539 kernel: audit: type=1103 audit(1707788657.173:775): pid=8992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.357581 kernel: audit: type=1006 audit(1707788657.173:776): pid=8992 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=55 res=1 Feb 13 01:44:17.173000 audit[8992]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce9242080 a2=3 a3=0 items=0 ppid=1 pid=8992 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:17.442739 sshd[9017]: Accepted publickey for core from 139.178.68.195 port 39038 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:17.443891 sshd[9017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:17.446046 systemd-logind[1543]: New session 56 of user core. Feb 13 01:44:17.446581 systemd[1]: Started session-56.scope. Feb 13 01:44:17.508248 kernel: audit: type=1300 audit(1707788657.173:776): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce9242080 a2=3 a3=0 items=0 ppid=1 pid=8992 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:17.508359 kernel: audit: type=1327 audit(1707788657.173:776): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:17.173000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:17.178000 audit[8992]: USER_START pid=8992 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.633195 kernel: audit: type=1105 audit(1707788657.178:777): pid=8992 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.633259 kernel: audit: type=1103 audit(1707788657.179:778): pid=8995 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.179000 audit[8995]: CRED_ACQ pid=8995 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.259000 audit[8992]: USER_END pid=8992 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.817964 kernel: audit: type=1106 audit(1707788657.259:779): pid=8992 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.818007 kernel: audit: type=1104 audit(1707788657.259:780): pid=8992 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.259000 audit[8992]: CRED_DISP pid=8992 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.90.7:22-139.178.68.195:39038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:17.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.7:22-139.178.68.195:39034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:17.441000 audit[9017]: USER_ACCT pid=9017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.442000 audit[9017]: CRED_ACQ pid=9017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.442000 audit[9017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4c320820 a2=3 a3=0 items=0 ppid=1 pid=9017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:17.442000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:17.446000 audit[9017]: USER_START pid=9017 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:17.447000 audit[9021]: CRED_ACQ pid=9021 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:18.351433 sshd[9017]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:18.352000 audit[9017]: USER_END pid=9017 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:18.352000 audit[9017]: CRED_DISP pid=9017 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:18.357359 systemd[1]: Started sshd@76-147.75.90.7:22-139.178.68.195:39046.service. Feb 13 01:44:18.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.90.7:22-139.178.68.195:39046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:18.357748 systemd[1]: sshd@75-147.75.90.7:22-139.178.68.195:39038.service: Deactivated successfully. Feb 13 01:44:18.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.90.7:22-139.178.68.195:39038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:18.358388 systemd-logind[1543]: Session 56 logged out. Waiting for processes to exit. Feb 13 01:44:18.358450 systemd[1]: session-56.scope: Deactivated successfully. Feb 13 01:44:18.359052 systemd-logind[1543]: Removed session 56. Feb 13 01:44:18.390483 sshd[9040]: Accepted publickey for core from 139.178.68.195 port 39046 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:18.388000 audit[9040]: USER_ACCT pid=9040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:18.389000 audit[9040]: CRED_ACQ pid=9040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:18.389000 audit[9040]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb6da0d60 a2=3 a3=0 items=0 ppid=1 pid=9040 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:18.389000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:18.391335 sshd[9040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:18.394386 systemd-logind[1543]: New session 57 of user core. Feb 13 01:44:18.394950 systemd[1]: Started session-57.scope. Feb 13 01:44:18.396000 audit[9040]: USER_START pid=9040 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:18.397000 audit[9044]: CRED_ACQ pid=9044 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.362789 sshd[9040]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:19.362000 audit[9040]: USER_END pid=9040 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.362000 audit[9040]: CRED_DISP pid=9040 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.367155 systemd[1]: Started sshd@77-147.75.90.7:22-139.178.68.195:39058.service. Feb 13 01:44:19.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.90.7:22-139.178.68.195:39058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:19.368164 systemd[1]: sshd@76-147.75.90.7:22-139.178.68.195:39046.service: Deactivated successfully. Feb 13 01:44:19.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.90.7:22-139.178.68.195:39046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:19.369294 systemd-logind[1543]: Session 57 logged out. Waiting for processes to exit. Feb 13 01:44:19.369395 systemd[1]: session-57.scope: Deactivated successfully. Feb 13 01:44:19.370368 systemd-logind[1543]: Removed session 57. Feb 13 01:44:19.381000 audit[9096]: NETFILTER_CFG table=filter:141 family=2 entries=18 op=nft_register_rule pid=9096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:44:19.381000 audit[9096]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffe227b1a10 a2=0 a3=7ffe227b19fc items=0 ppid=3066 pid=9096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:19.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:44:19.382000 audit[9096]: NETFILTER_CFG table=nat:142 family=2 entries=94 op=nft_register_rule pid=9096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:44:19.382000 audit[9096]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffe227b1a10 a2=0 a3=7ffe227b19fc items=0 ppid=3066 pid=9096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:19.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:44:19.404000 audit[9083]: USER_ACCT pid=9083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.406051 sshd[9083]: Accepted publickey for core from 139.178.68.195 port 39058 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:19.405000 audit[9083]: CRED_ACQ pid=9083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.405000 audit[9083]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9d469300 a2=3 a3=0 items=0 ppid=1 pid=9083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:19.405000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:19.407013 sshd[9083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:19.409850 systemd-logind[1543]: New session 58 of user core. Feb 13 01:44:19.410436 systemd[1]: Started session-58.scope. Feb 13 01:44:19.411000 audit[9083]: USER_START pid=9083 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.412000 audit[9117]: CRED_ACQ pid=9117 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.420000 audit[9124]: NETFILTER_CFG table=filter:143 family=2 entries=30 op=nft_register_rule pid=9124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:44:19.420000 audit[9124]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffee9c8c3b0 a2=0 a3=7ffee9c8c39c items=0 ppid=3066 pid=9124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:19.420000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:44:19.421000 audit[9124]: NETFILTER_CFG table=nat:144 family=2 entries=94 op=nft_register_rule pid=9124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 01:44:19.421000 audit[9124]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffee9c8c3b0 a2=0 a3=7ffee9c8c39c items=0 ppid=3066 pid=9124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:19.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 01:44:19.598958 sshd[9083]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:19.597000 audit[9083]: USER_END pid=9083 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.597000 audit[9083]: CRED_DISP pid=9083 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.600533 systemd[1]: Started sshd@78-147.75.90.7:22-139.178.68.195:39062.service. Feb 13 01:44:19.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.90.7:22-139.178.68.195:39062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:19.600861 systemd[1]: sshd@77-147.75.90.7:22-139.178.68.195:39058.service: Deactivated successfully. Feb 13 01:44:19.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.90.7:22-139.178.68.195:39058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:19.601398 systemd-logind[1543]: Session 58 logged out. Waiting for processes to exit. Feb 13 01:44:19.601433 systemd[1]: session-58.scope: Deactivated successfully. Feb 13 01:44:19.601905 systemd-logind[1543]: Removed session 58. Feb 13 01:44:19.631000 audit[9144]: USER_ACCT pid=9144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.633347 sshd[9144]: Accepted publickey for core from 139.178.68.195 port 39062 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:19.632000 audit[9144]: CRED_ACQ pid=9144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.632000 audit[9144]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca69adc70 a2=3 a3=0 items=0 ppid=1 pid=9144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:19.632000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:19.634249 sshd[9144]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:19.637292 systemd-logind[1543]: New session 59 of user core. Feb 13 01:44:19.637861 systemd[1]: Started session-59.scope. Feb 13 01:44:19.639000 audit[9144]: USER_START pid=9144 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.639000 audit[9148]: CRED_ACQ pid=9148 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.767305 sshd[9144]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:19.766000 audit[9144]: USER_END pid=9144 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.766000 audit[9144]: CRED_DISP pid=9144 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:19.769136 systemd[1]: sshd@78-147.75.90.7:22-139.178.68.195:39062.service: Deactivated successfully. Feb 13 01:44:19.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.90.7:22-139.178.68.195:39062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:19.769985 systemd[1]: session-59.scope: Deactivated successfully. Feb 13 01:44:19.770018 systemd-logind[1543]: Session 59 logged out. Waiting for processes to exit. Feb 13 01:44:19.770593 systemd-logind[1543]: Removed session 59. Feb 13 01:44:24.241788 systemd[1]: Started sshd@79-147.75.90.7:22-101.42.234.252:58212.service. Feb 13 01:44:24.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.90.7:22-101.42.234.252:58212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:24.268678 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 13 01:44:24.268743 kernel: audit: type=1130 audit(1707788664.240:822): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.90.7:22-101.42.234.252:58212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:24.773264 systemd[1]: Started sshd@80-147.75.90.7:22-139.178.68.195:39078.service. Feb 13 01:44:24.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.90.7:22-139.178.68.195:39078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:24.864684 kernel: audit: type=1130 audit(1707788664.771:823): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.90.7:22-139.178.68.195:39078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:24.889000 audit[9212]: USER_ACCT pid=9212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:24.891786 sshd[9212]: Accepted publickey for core from 139.178.68.195 port 39078 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:24.893758 sshd[9212]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:24.899507 systemd-logind[1543]: New session 60 of user core. Feb 13 01:44:24.900729 systemd[1]: Started session-60.scope. Feb 13 01:44:24.891000 audit[9212]: CRED_ACQ pid=9212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:24.984967 sshd[9212]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:24.986347 systemd[1]: sshd@80-147.75.90.7:22-139.178.68.195:39078.service: Deactivated successfully. Feb 13 01:44:24.987028 systemd[1]: session-60.scope: Deactivated successfully. Feb 13 01:44:24.987064 systemd-logind[1543]: Session 60 logged out. Waiting for processes to exit. Feb 13 01:44:24.987517 systemd-logind[1543]: Removed session 60. Feb 13 01:44:25.074515 kernel: audit: type=1101 audit(1707788664.889:824): pid=9212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:25.074561 kernel: audit: type=1103 audit(1707788664.891:825): pid=9212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:25.074583 kernel: audit: type=1006 audit(1707788664.891:826): pid=9212 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=60 res=1 Feb 13 01:44:25.133197 kernel: audit: type=1300 audit(1707788664.891:826): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcaaba6b00 a2=3 a3=0 items=0 ppid=1 pid=9212 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:24.891000 audit[9212]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcaaba6b00 a2=3 a3=0 items=0 ppid=1 pid=9212 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:25.225091 kernel: audit: type=1327 audit(1707788664.891:826): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:24.891000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:25.255592 kernel: audit: type=1105 audit(1707788664.906:827): pid=9212 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:24.906000 audit[9212]: USER_START pid=9212 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:25.350819 kernel: audit: type=1103 audit(1707788664.907:828): pid=9215 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:24.907000 audit[9215]: CRED_ACQ pid=9215 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:25.439956 kernel: audit: type=1106 audit(1707788664.984:829): pid=9212 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:24.984000 audit[9212]: USER_END pid=9212 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:24.984000 audit[9212]: CRED_DISP pid=9212 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:24.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.90.7:22-139.178.68.195:39078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:26.035383 sshd[9211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.234.252 user=root Feb 13 01:44:26.034000 audit[9211]: USER_AUTH pid=9211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.234.252 addr=101.42.234.252 terminal=ssh res=failed' Feb 13 01:44:28.215717 sshd[9211]: Failed password for root from 101.42.234.252 port 58212 ssh2 Feb 13 01:44:29.472554 sshd[9211]: Received disconnect from 101.42.234.252 port 58212:11: Bye Bye [preauth] Feb 13 01:44:29.472554 sshd[9211]: Disconnected from authenticating user root 101.42.234.252 port 58212 [preauth] Feb 13 01:44:29.475247 systemd[1]: sshd@79-147.75.90.7:22-101.42.234.252:58212.service: Deactivated successfully. Feb 13 01:44:29.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.90.7:22-101.42.234.252:58212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:29.503238 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 01:44:29.503286 kernel: audit: type=1131 audit(1707788669.474:833): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.90.7:22-101.42.234.252:58212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:29.991894 systemd[1]: Started sshd@81-147.75.90.7:22-139.178.68.195:53970.service. Feb 13 01:44:29.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.90.7:22-139.178.68.195:53970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:30.081619 kernel: audit: type=1130 audit(1707788669.990:834): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.90.7:22-139.178.68.195:53970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:30.107000 audit[9309]: USER_ACCT pid=9309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.109019 sshd[9309]: Accepted publickey for core from 139.178.68.195 port 53970 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:30.110137 sshd[9309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:30.112625 systemd-logind[1543]: New session 61 of user core. Feb 13 01:44:30.113085 systemd[1]: Started session-61.scope. Feb 13 01:44:30.192545 sshd[9309]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:30.193780 systemd[1]: sshd@81-147.75.90.7:22-139.178.68.195:53970.service: Deactivated successfully. Feb 13 01:44:30.194382 systemd[1]: session-61.scope: Deactivated successfully. Feb 13 01:44:30.194399 systemd-logind[1543]: Session 61 logged out. Waiting for processes to exit. Feb 13 01:44:30.194867 systemd-logind[1543]: Removed session 61. Feb 13 01:44:30.108000 audit[9309]: CRED_ACQ pid=9309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.292702 kernel: audit: type=1101 audit(1707788670.107:835): pid=9309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.292737 kernel: audit: type=1103 audit(1707788670.108:836): pid=9309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.292760 kernel: audit: type=1006 audit(1707788670.108:837): pid=9309 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=61 res=1 Feb 13 01:44:30.108000 audit[9309]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc594f4990 a2=3 a3=0 items=0 ppid=1 pid=9309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:30.443834 kernel: audit: type=1300 audit(1707788670.108:837): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc594f4990 a2=3 a3=0 items=0 ppid=1 pid=9309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:30.443859 kernel: audit: type=1327 audit(1707788670.108:837): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:30.108000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:30.113000 audit[9309]: USER_START pid=9309 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.570053 kernel: audit: type=1105 audit(1707788670.113:838): pid=9309 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.570081 kernel: audit: type=1103 audit(1707788670.114:839): pid=9312 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.114000 audit[9312]: CRED_ACQ pid=9312 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.659697 kernel: audit: type=1106 audit(1707788670.191:840): pid=9309 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.191000 audit[9309]: USER_END pid=9309 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.191000 audit[9309]: CRED_DISP pid=9309 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:30.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.90.7:22-139.178.68.195:53970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:35.199718 systemd[1]: Started sshd@82-147.75.90.7:22-139.178.68.195:53982.service. Feb 13 01:44:35.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.90.7:22-139.178.68.195:53982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:35.227114 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:44:35.227200 kernel: audit: type=1130 audit(1707788675.198:843): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.90.7:22-139.178.68.195:53982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:35.344000 audit[9335]: USER_ACCT pid=9335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.345074 sshd[9335]: Accepted publickey for core from 139.178.68.195 port 53982 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:35.346434 sshd[9335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:35.348836 systemd-logind[1543]: New session 62 of user core. Feb 13 01:44:35.349389 systemd[1]: Started session-62.scope. Feb 13 01:44:35.433072 sshd[9335]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:35.434325 systemd[1]: sshd@82-147.75.90.7:22-139.178.68.195:53982.service: Deactivated successfully. Feb 13 01:44:35.434970 systemd[1]: session-62.scope: Deactivated successfully. Feb 13 01:44:35.434994 systemd-logind[1543]: Session 62 logged out. Waiting for processes to exit. Feb 13 01:44:35.435461 systemd-logind[1543]: Removed session 62. Feb 13 01:44:35.344000 audit[9335]: CRED_ACQ pid=9335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.527678 kernel: audit: type=1101 audit(1707788675.344:844): pid=9335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.527718 kernel: audit: type=1103 audit(1707788675.344:845): pid=9335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.527733 kernel: audit: type=1006 audit(1707788675.344:846): pid=9335 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=62 res=1 Feb 13 01:44:35.586820 kernel: audit: type=1300 audit(1707788675.344:846): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8cbfd3b0 a2=3 a3=0 items=0 ppid=1 pid=9335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:35.344000 audit[9335]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8cbfd3b0 a2=3 a3=0 items=0 ppid=1 pid=9335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:35.679692 kernel: audit: type=1327 audit(1707788675.344:846): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:35.344000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:35.710456 kernel: audit: type=1105 audit(1707788675.350:847): pid=9335 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.350000 audit[9335]: USER_START pid=9335 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.805811 kernel: audit: type=1103 audit(1707788675.350:848): pid=9338 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.350000 audit[9338]: CRED_ACQ pid=9338 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.895529 kernel: audit: type=1106 audit(1707788675.432:849): pid=9335 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.432000 audit[9335]: USER_END pid=9335 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.991447 kernel: audit: type=1104 audit(1707788675.432:850): pid=9335 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.432000 audit[9335]: CRED_DISP pid=9335 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:35.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.90.7:22-139.178.68.195:53982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:38.942592 systemd[1]: Started sshd@83-147.75.90.7:22-124.221.203.42:49706.service. Feb 13 01:44:38.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.90.7:22-124.221.203.42:49706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:40.439604 systemd[1]: Started sshd@84-147.75.90.7:22-139.178.68.195:52176.service. Feb 13 01:44:40.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.90.7:22-139.178.68.195:52176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:40.466847 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:44:40.466949 kernel: audit: type=1130 audit(1707788680.438:853): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.90.7:22-139.178.68.195:52176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:40.583677 sshd[9365]: Accepted publickey for core from 139.178.68.195 port 52176 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:40.582000 audit[9365]: USER_ACCT pid=9365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:40.585228 sshd[9365]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:40.587717 systemd-logind[1543]: New session 63 of user core. Feb 13 01:44:40.588213 systemd[1]: Started session-63.scope. Feb 13 01:44:40.668926 sshd[9365]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:40.670440 systemd[1]: sshd@84-147.75.90.7:22-139.178.68.195:52176.service: Deactivated successfully. Feb 13 01:44:40.671060 systemd[1]: session-63.scope: Deactivated successfully. Feb 13 01:44:40.671084 systemd-logind[1543]: Session 63 logged out. Waiting for processes to exit. Feb 13 01:44:40.671552 systemd-logind[1543]: Removed session 63. Feb 13 01:44:40.583000 audit[9365]: CRED_ACQ pid=9365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:40.767027 kernel: audit: type=1101 audit(1707788680.582:854): pid=9365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:40.767069 kernel: audit: type=1103 audit(1707788680.583:855): pid=9365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:40.767087 kernel: audit: type=1006 audit(1707788680.583:856): pid=9365 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=63 res=1 Feb 13 01:44:40.825875 kernel: audit: type=1300 audit(1707788680.583:856): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1820b650 a2=3 a3=0 items=0 ppid=1 pid=9365 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:40.583000 audit[9365]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1820b650 a2=3 a3=0 items=0 ppid=1 pid=9365 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:40.918368 kernel: audit: type=1327 audit(1707788680.583:856): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:40.583000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:40.949017 kernel: audit: type=1105 audit(1707788680.588:857): pid=9365 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:40.588000 audit[9365]: USER_START pid=9365 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:41.044037 kernel: audit: type=1103 audit(1707788680.589:858): pid=9368 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:40.589000 audit[9368]: CRED_ACQ pid=9368 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:41.133241 kernel: audit: type=1106 audit(1707788680.668:859): pid=9365 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:40.668000 audit[9365]: USER_END pid=9365 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:41.229419 kernel: audit: type=1104 audit(1707788680.668:860): pid=9365 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:40.668000 audit[9365]: CRED_DISP pid=9365 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:40.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.90.7:22-139.178.68.195:52176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:44.116460 systemd[1]: Started sshd@85-147.75.90.7:22-124.221.122.203:45996.service. Feb 13 01:44:44.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.90.7:22-124.221.122.203:45996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:44.965450 sshd[9393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.122.203 user=root Feb 13 01:44:44.964000 audit[9393]: USER_AUTH pid=9393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.122.203 addr=124.221.122.203 terminal=ssh res=failed' Feb 13 01:44:45.677147 systemd[1]: Started sshd@86-147.75.90.7:22-139.178.68.195:52180.service. Feb 13 01:44:45.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.90.7:22-139.178.68.195:52180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:45.704523 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 01:44:45.704557 kernel: audit: type=1130 audit(1707788685.675:864): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.90.7:22-139.178.68.195:52180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:45.820000 audit[9395]: USER_ACCT pid=9395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:45.822955 sshd[9395]: Accepted publickey for core from 139.178.68.195 port 52180 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:45.827897 sshd[9395]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:45.832233 systemd-logind[1543]: New session 64 of user core. Feb 13 01:44:45.832770 systemd[1]: Started session-64.scope. Feb 13 01:44:45.825000 audit[9395]: CRED_ACQ pid=9395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:45.918720 sshd[9395]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:45.920156 systemd[1]: sshd@86-147.75.90.7:22-139.178.68.195:52180.service: Deactivated successfully. Feb 13 01:44:45.920814 systemd-logind[1543]: Session 64 logged out. Waiting for processes to exit. Feb 13 01:44:45.920842 systemd[1]: session-64.scope: Deactivated successfully. Feb 13 01:44:45.921358 systemd-logind[1543]: Removed session 64. Feb 13 01:44:46.004742 kernel: audit: type=1101 audit(1707788685.820:865): pid=9395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:46.004795 kernel: audit: type=1103 audit(1707788685.825:866): pid=9395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:46.004834 kernel: audit: type=1006 audit(1707788685.825:867): pid=9395 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=64 res=1 Feb 13 01:44:46.063336 kernel: audit: type=1300 audit(1707788685.825:867): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc18622d0 a2=3 a3=0 items=0 ppid=1 pid=9395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:45.825000 audit[9395]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc18622d0 a2=3 a3=0 items=0 ppid=1 pid=9395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:46.155410 kernel: audit: type=1327 audit(1707788685.825:867): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:45.825000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:46.185866 kernel: audit: type=1105 audit(1707788685.833:868): pid=9395 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:45.833000 audit[9395]: USER_START pid=9395 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:46.280404 kernel: audit: type=1103 audit(1707788685.834:869): pid=9398 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:45.834000 audit[9398]: CRED_ACQ pid=9398 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:46.369615 kernel: audit: type=1106 audit(1707788685.917:870): pid=9395 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:45.917000 audit[9395]: USER_END pid=9395 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:46.465156 kernel: audit: type=1104 audit(1707788685.917:871): pid=9395 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:45.917000 audit[9395]: CRED_DISP pid=9395 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:45.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.90.7:22-139.178.68.195:52180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:47.285919 sshd[9393]: Failed password for root from 124.221.122.203 port 45996 ssh2 Feb 13 01:44:48.407419 sshd[9393]: Received disconnect from 124.221.122.203 port 45996:11: Bye Bye [preauth] Feb 13 01:44:48.407419 sshd[9393]: Disconnected from authenticating user root 124.221.122.203 port 45996 [preauth] Feb 13 01:44:48.409952 systemd[1]: sshd@85-147.75.90.7:22-124.221.122.203:45996.service: Deactivated successfully. Feb 13 01:44:48.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.90.7:22-124.221.122.203:45996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:50.924856 systemd[1]: Started sshd@87-147.75.90.7:22-139.178.68.195:47046.service. Feb 13 01:44:50.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.90.7:22-139.178.68.195:47046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:50.952143 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:44:50.952222 kernel: audit: type=1130 audit(1707788690.923:874): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.90.7:22-139.178.68.195:47046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:51.067000 audit[9465]: USER_ACCT pid=9465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.069861 sshd[9465]: Accepted publickey for core from 139.178.68.195 port 47046 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:51.073006 sshd[9465]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:51.078509 systemd-logind[1543]: New session 65 of user core. Feb 13 01:44:51.078924 systemd[1]: Started session-65.scope. Feb 13 01:44:51.160165 sshd[9465]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:51.070000 audit[9465]: CRED_ACQ pid=9465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.161419 systemd[1]: sshd@87-147.75.90.7:22-139.178.68.195:47046.service: Deactivated successfully. Feb 13 01:44:51.162091 systemd[1]: session-65.scope: Deactivated successfully. Feb 13 01:44:51.162129 systemd-logind[1543]: Session 65 logged out. Waiting for processes to exit. Feb 13 01:44:51.162553 systemd-logind[1543]: Removed session 65. Feb 13 01:44:51.251479 kernel: audit: type=1101 audit(1707788691.067:875): pid=9465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.251519 kernel: audit: type=1103 audit(1707788691.070:876): pid=9465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.251537 kernel: audit: type=1006 audit(1707788691.070:877): pid=9465 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=65 res=1 Feb 13 01:44:51.310054 kernel: audit: type=1300 audit(1707788691.070:877): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec9ee91c0 a2=3 a3=0 items=0 ppid=1 pid=9465 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:51.070000 audit[9465]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec9ee91c0 a2=3 a3=0 items=0 ppid=1 pid=9465 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:51.402103 kernel: audit: type=1327 audit(1707788691.070:877): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:51.070000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:51.432579 kernel: audit: type=1105 audit(1707788691.079:878): pid=9465 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.079000 audit[9465]: USER_START pid=9465 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.527057 kernel: audit: type=1103 audit(1707788691.079:879): pid=9468 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.079000 audit[9468]: CRED_ACQ pid=9468 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.616270 kernel: audit: type=1106 audit(1707788691.159:880): pid=9465 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.159000 audit[9465]: USER_END pid=9465 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.159000 audit[9465]: CRED_DISP pid=9465 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.800996 kernel: audit: type=1104 audit(1707788691.159:881): pid=9465 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:51.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.90.7:22-139.178.68.195:47046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:56.166339 systemd[1]: Started sshd@88-147.75.90.7:22-139.178.68.195:38490.service. Feb 13 01:44:56.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.90.7:22-139.178.68.195:38490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:56.192664 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:44:56.192733 kernel: audit: type=1130 audit(1707788696.164:883): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.90.7:22-139.178.68.195:38490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:56.306000 audit[9494]: USER_ACCT pid=9494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.308557 sshd[9494]: Accepted publickey for core from 139.178.68.195 port 38490 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:44:56.315494 sshd[9494]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:44:56.317694 systemd-logind[1543]: New session 66 of user core. Feb 13 01:44:56.318325 systemd[1]: Started session-66.scope. Feb 13 01:44:56.395796 sshd[9494]: pam_unix(sshd:session): session closed for user core Feb 13 01:44:56.397153 systemd[1]: sshd@88-147.75.90.7:22-139.178.68.195:38490.service: Deactivated successfully. Feb 13 01:44:56.397815 systemd[1]: session-66.scope: Deactivated successfully. Feb 13 01:44:56.397865 systemd-logind[1543]: Session 66 logged out. Waiting for processes to exit. Feb 13 01:44:56.398386 systemd-logind[1543]: Removed session 66. Feb 13 01:44:56.313000 audit[9494]: CRED_ACQ pid=9494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.490250 kernel: audit: type=1101 audit(1707788696.306:884): pid=9494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.490292 kernel: audit: type=1103 audit(1707788696.313:885): pid=9494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.490307 kernel: audit: type=1006 audit(1707788696.313:886): pid=9494 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=66 res=1 Feb 13 01:44:56.548753 kernel: audit: type=1300 audit(1707788696.313:886): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80254a80 a2=3 a3=0 items=0 ppid=1 pid=9494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:56.313000 audit[9494]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80254a80 a2=3 a3=0 items=0 ppid=1 pid=9494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:44:56.640752 kernel: audit: type=1327 audit(1707788696.313:886): proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:56.313000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:44:56.671238 kernel: audit: type=1105 audit(1707788696.318:887): pid=9494 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.318000 audit[9494]: USER_START pid=9494 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.765702 kernel: audit: type=1103 audit(1707788696.319:888): pid=9516 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.319000 audit[9516]: CRED_ACQ pid=9516 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.854842 kernel: audit: type=1106 audit(1707788696.394:889): pid=9494 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.394000 audit[9494]: USER_END pid=9494 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.394000 audit[9494]: CRED_DISP pid=9494 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:57.039614 kernel: audit: type=1104 audit(1707788696.394:890): pid=9494 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:44:56.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.90.7:22-139.178.68.195:38490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:01.403154 systemd[1]: Started sshd@89-147.75.90.7:22-139.178.68.195:38498.service. Feb 13 01:45:01.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.90.7:22-139.178.68.195:38498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:01.430399 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:45:01.430481 kernel: audit: type=1130 audit(1707788701.401:892): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.90.7:22-139.178.68.195:38498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:01.545000 audit[9564]: USER_ACCT pid=9564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:01.547679 sshd[9564]: Accepted publickey for core from 139.178.68.195 port 38498 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:01.548889 sshd[9564]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:01.551194 systemd-logind[1543]: New session 67 of user core. Feb 13 01:45:01.551627 systemd[1]: Started session-67.scope. Feb 13 01:45:01.627445 sshd[9564]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:01.628762 systemd[1]: sshd@89-147.75.90.7:22-139.178.68.195:38498.service: Deactivated successfully. Feb 13 01:45:01.629409 systemd[1]: session-67.scope: Deactivated successfully. Feb 13 01:45:01.629429 systemd-logind[1543]: Session 67 logged out. Waiting for processes to exit. Feb 13 01:45:01.630026 systemd-logind[1543]: Removed session 67. Feb 13 01:45:01.547000 audit[9564]: CRED_ACQ pid=9564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:01.729338 kernel: audit: type=1101 audit(1707788701.545:893): pid=9564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:01.729374 kernel: audit: type=1103 audit(1707788701.547:894): pid=9564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:01.729392 kernel: audit: type=1006 audit(1707788701.547:895): pid=9564 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=67 res=1 Feb 13 01:45:01.547000 audit[9564]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfbf924d0 a2=3 a3=0 items=0 ppid=1 pid=9564 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:01.879852 kernel: audit: type=1300 audit(1707788701.547:895): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfbf924d0 a2=3 a3=0 items=0 ppid=1 pid=9564 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:01.879887 kernel: audit: type=1327 audit(1707788701.547:895): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:01.547000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:01.552000 audit[9564]: USER_START pid=9564 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:02.004696 kernel: audit: type=1105 audit(1707788701.552:896): pid=9564 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:02.004731 kernel: audit: type=1103 audit(1707788701.553:897): pid=9567 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:01.553000 audit[9567]: CRED_ACQ pid=9567 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:02.093863 kernel: audit: type=1106 audit(1707788701.626:898): pid=9564 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:01.626000 audit[9564]: USER_END pid=9564 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:02.189336 kernel: audit: type=1104 audit(1707788701.626:899): pid=9564 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:01.626000 audit[9564]: CRED_DISP pid=9564 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:01.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.90.7:22-139.178.68.195:38498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:06.634810 systemd[1]: Started sshd@90-147.75.90.7:22-139.178.68.195:50728.service. Feb 13 01:45:06.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.90.7:22-139.178.68.195:50728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:06.661853 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:45:06.661931 kernel: audit: type=1130 audit(1707788706.633:901): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.90.7:22-139.178.68.195:50728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:06.778755 sshd[9591]: Accepted publickey for core from 139.178.68.195 port 50728 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:06.777000 audit[9591]: USER_ACCT pid=9591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:06.779939 sshd[9591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:06.782588 systemd-logind[1543]: New session 68 of user core. Feb 13 01:45:06.783119 systemd[1]: Started session-68.scope. Feb 13 01:45:06.865630 sshd[9591]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:06.867066 systemd[1]: sshd@90-147.75.90.7:22-139.178.68.195:50728.service: Deactivated successfully. Feb 13 01:45:06.867622 systemd-logind[1543]: Session 68 logged out. Waiting for processes to exit. Feb 13 01:45:06.867655 systemd[1]: session-68.scope: Deactivated successfully. Feb 13 01:45:06.868098 systemd-logind[1543]: Removed session 68. Feb 13 01:45:06.778000 audit[9591]: CRED_ACQ pid=9591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:06.961972 kernel: audit: type=1101 audit(1707788706.777:902): pid=9591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:06.962041 kernel: audit: type=1103 audit(1707788706.778:903): pid=9591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:06.962076 kernel: audit: type=1006 audit(1707788706.778:904): pid=9591 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=68 res=1 Feb 13 01:45:06.778000 audit[9591]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd801b11e0 a2=3 a3=0 items=0 ppid=1 pid=9591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:07.112579 kernel: audit: type=1300 audit(1707788706.778:904): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd801b11e0 a2=3 a3=0 items=0 ppid=1 pid=9591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:07.112639 kernel: audit: type=1327 audit(1707788706.778:904): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:06.778000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:06.783000 audit[9591]: USER_START pid=9591 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:07.237480 kernel: audit: type=1105 audit(1707788706.783:905): pid=9591 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:07.237542 kernel: audit: type=1103 audit(1707788706.784:906): pid=9594 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:06.784000 audit[9594]: CRED_ACQ pid=9594 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:06.864000 audit[9591]: USER_END pid=9591 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:07.422300 kernel: audit: type=1106 audit(1707788706.864:907): pid=9591 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:07.422378 kernel: audit: type=1104 audit(1707788706.864:908): pid=9591 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:06.864000 audit[9591]: CRED_DISP pid=9591 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:06.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.90.7:22-139.178.68.195:50728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:11.874853 systemd[1]: Started sshd@91-147.75.90.7:22-139.178.68.195:50744.service. Feb 13 01:45:11.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.90.7:22-139.178.68.195:50744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:11.902391 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:45:11.902477 kernel: audit: type=1130 audit(1707788711.873:910): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.90.7:22-139.178.68.195:50744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:12.017000 audit[9619]: USER_ACCT pid=9619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.019721 sshd[9619]: Accepted publickey for core from 139.178.68.195 port 50744 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:12.021065 sshd[9619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:12.023426 systemd-logind[1543]: New session 69 of user core. Feb 13 01:45:12.024095 systemd[1]: Started session-69.scope. Feb 13 01:45:12.102646 sshd[9619]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:12.104107 systemd[1]: sshd@91-147.75.90.7:22-139.178.68.195:50744.service: Deactivated successfully. Feb 13 01:45:12.104741 systemd-logind[1543]: Session 69 logged out. Waiting for processes to exit. Feb 13 01:45:12.104766 systemd[1]: session-69.scope: Deactivated successfully. Feb 13 01:45:12.105203 systemd-logind[1543]: Removed session 69. Feb 13 01:45:12.019000 audit[9619]: CRED_ACQ pid=9619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.201857 kernel: audit: type=1101 audit(1707788712.017:911): pid=9619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.201955 kernel: audit: type=1103 audit(1707788712.019:912): pid=9619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.201997 kernel: audit: type=1006 audit(1707788712.019:913): pid=9619 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=69 res=1 Feb 13 01:45:12.019000 audit[9619]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc1d334b0 a2=3 a3=0 items=0 ppid=1 pid=9619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:12.352534 kernel: audit: type=1300 audit(1707788712.019:913): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc1d334b0 a2=3 a3=0 items=0 ppid=1 pid=9619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:12.352599 kernel: audit: type=1327 audit(1707788712.019:913): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:12.019000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:12.024000 audit[9619]: USER_START pid=9619 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.477467 kernel: audit: type=1105 audit(1707788712.024:914): pid=9619 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.477527 kernel: audit: type=1103 audit(1707788712.025:915): pid=9622 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.025000 audit[9622]: CRED_ACQ pid=9622 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.101000 audit[9619]: USER_END pid=9619 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.662128 kernel: audit: type=1106 audit(1707788712.101:916): pid=9619 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.662238 kernel: audit: type=1104 audit(1707788712.101:917): pid=9619 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.101000 audit[9619]: CRED_DISP pid=9619 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:12.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.90.7:22-139.178.68.195:50744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:16.455063 systemd[1]: Started sshd@92-147.75.90.7:22-124.221.122.203:54384.service. Feb 13 01:45:16.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.90.7:22-124.221.122.203:54384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:17.110426 systemd[1]: Started sshd@93-147.75.90.7:22-139.178.68.195:42174.service. Feb 13 01:45:17.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.90.7:22-139.178.68.195:42174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:17.137325 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:45:17.137502 kernel: audit: type=1130 audit(1707788717.108:920): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.90.7:22-139.178.68.195:42174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:17.164220 sshd[9663]: Accepted publickey for core from 139.178.68.195 port 42174 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:17.165402 sshd[9663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:17.167920 systemd-logind[1543]: New session 70 of user core. Feb 13 01:45:17.168708 systemd[1]: Started session-70.scope. Feb 13 01:45:17.162000 audit[9663]: USER_ACCT pid=9663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.248089 sshd[9663]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:17.249482 systemd[1]: sshd@93-147.75.90.7:22-139.178.68.195:42174.service: Deactivated successfully. Feb 13 01:45:17.250181 systemd-logind[1543]: Session 70 logged out. Waiting for processes to exit. Feb 13 01:45:17.250202 systemd[1]: session-70.scope: Deactivated successfully. Feb 13 01:45:17.250708 systemd-logind[1543]: Removed session 70. Feb 13 01:45:17.294708 sshd[9661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.122.203 user=root Feb 13 01:45:17.319076 kernel: audit: type=1101 audit(1707788717.162:921): pid=9663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.319130 kernel: audit: type=1103 audit(1707788717.163:922): pid=9663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.163000 audit[9663]: CRED_ACQ pid=9663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.468139 kernel: audit: type=1006 audit(1707788717.163:923): pid=9663 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=70 res=1 Feb 13 01:45:17.468233 kernel: audit: type=1300 audit(1707788717.163:923): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3ee27420 a2=3 a3=0 items=0 ppid=1 pid=9663 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:17.163000 audit[9663]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3ee27420 a2=3 a3=0 items=0 ppid=1 pid=9663 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:17.163000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:17.590590 kernel: audit: type=1327 audit(1707788717.163:923): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:17.590644 kernel: audit: type=1105 audit(1707788717.169:924): pid=9663 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.169000 audit[9663]: USER_START pid=9663 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.170000 audit[9666]: CRED_ACQ pid=9666 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.774223 kernel: audit: type=1103 audit(1707788717.170:925): pid=9666 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.774295 kernel: audit: type=1106 audit(1707788717.247:926): pid=9663 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.247000 audit[9663]: USER_END pid=9663 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.247000 audit[9663]: CRED_DISP pid=9663 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.959000 kernel: audit: type=1104 audit(1707788717.247:927): pid=9663 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:17.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.90.7:22-139.178.68.195:42174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:17.293000 audit[9661]: USER_AUTH pid=9661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.122.203 addr=124.221.122.203 terminal=ssh res=failed' Feb 13 01:45:19.810894 sshd[9661]: Failed password for root from 124.221.122.203 port 54384 ssh2 Feb 13 01:45:20.288866 systemd[1]: Started sshd@94-147.75.90.7:22-124.221.203.42:57202.service. Feb 13 01:45:20.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.90.7:22-124.221.203.42:57202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:20.740955 sshd[9661]: Received disconnect from 124.221.122.203 port 54384:11: Bye Bye [preauth] Feb 13 01:45:20.740955 sshd[9661]: Disconnected from authenticating user root 124.221.122.203 port 54384 [preauth] Feb 13 01:45:20.743428 systemd[1]: sshd@92-147.75.90.7:22-124.221.122.203:54384.service: Deactivated successfully. Feb 13 01:45:20.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.90.7:22-124.221.122.203:54384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:21.929307 sshd[9727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.203.42 user=root Feb 13 01:45:21.927000 audit[9727]: USER_AUTH pid=9727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.203.42 addr=124.221.203.42 terminal=ssh res=failed' Feb 13 01:45:22.255888 systemd[1]: Started sshd@95-147.75.90.7:22-139.178.68.195:42182.service. Feb 13 01:45:22.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.90.7:22-139.178.68.195:42182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:22.282955 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 01:45:22.283017 kernel: audit: type=1130 audit(1707788722.254:933): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.90.7:22-139.178.68.195:42182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:22.309734 sshd[9731]: Accepted publickey for core from 139.178.68.195 port 42182 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:22.311323 sshd[9731]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:22.313717 systemd-logind[1543]: New session 71 of user core. Feb 13 01:45:22.314483 systemd[1]: Started session-71.scope. Feb 13 01:45:22.308000 audit[9731]: USER_ACCT pid=9731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.392561 sshd[9731]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:22.394063 systemd[1]: sshd@95-147.75.90.7:22-139.178.68.195:42182.service: Deactivated successfully. Feb 13 01:45:22.394679 systemd-logind[1543]: Session 71 logged out. Waiting for processes to exit. Feb 13 01:45:22.394725 systemd[1]: session-71.scope: Deactivated successfully. Feb 13 01:45:22.395257 systemd-logind[1543]: Removed session 71. Feb 13 01:45:22.463343 kernel: audit: type=1101 audit(1707788722.308:934): pid=9731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.463379 kernel: audit: type=1103 audit(1707788722.309:935): pid=9731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.309000 audit[9731]: CRED_ACQ pid=9731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.553808 kernel: audit: type=1006 audit(1707788722.309:936): pid=9731 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=71 res=1 Feb 13 01:45:22.612335 kernel: audit: type=1300 audit(1707788722.309:936): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff915cb590 a2=3 a3=0 items=0 ppid=1 pid=9731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:22.309000 audit[9731]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff915cb590 a2=3 a3=0 items=0 ppid=1 pid=9731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:22.704368 kernel: audit: type=1327 audit(1707788722.309:936): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:22.309000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:22.734788 kernel: audit: type=1105 audit(1707788722.315:937): pid=9731 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.315000 audit[9731]: USER_START pid=9731 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.829212 kernel: audit: type=1103 audit(1707788722.315:938): pid=9734 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.315000 audit[9734]: CRED_ACQ pid=9734 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.918321 kernel: audit: type=1106 audit(1707788722.391:939): pid=9731 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.391000 audit[9731]: USER_END pid=9731 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:23.013806 kernel: audit: type=1104 audit(1707788722.391:940): pid=9731 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.391000 audit[9731]: CRED_DISP pid=9731 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:22.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.90.7:22-139.178.68.195:42182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:23.512219 systemd[1]: Started sshd@96-147.75.90.7:22-101.42.234.252:36986.service. Feb 13 01:45:23.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.90.7:22-101.42.234.252:36986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:23.994072 sshd[9727]: Failed password for root from 124.221.203.42 port 57202 ssh2 Feb 13 01:45:24.361203 sshd[9757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.234.252 user=root Feb 13 01:45:24.359000 audit[9757]: ANOM_LOGIN_FAILURES pid=9757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:24.359000 audit[9757]: USER_AUTH pid=9757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.234.252 addr=101.42.234.252 terminal=ssh res=failed' Feb 13 01:45:24.361440 sshd[9757]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:45:25.376981 sshd[9727]: Received disconnect from 124.221.203.42 port 57202:11: Bye Bye [preauth] Feb 13 01:45:25.376981 sshd[9727]: Disconnected from authenticating user root 124.221.203.42 port 57202 [preauth] Feb 13 01:45:25.379393 systemd[1]: sshd@94-147.75.90.7:22-124.221.203.42:57202.service: Deactivated successfully. Feb 13 01:45:25.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.90.7:22-124.221.203.42:57202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:26.169783 sshd[9757]: Failed password for root from 101.42.234.252 port 36986 ssh2 Feb 13 01:45:27.396668 systemd[1]: Started sshd@97-147.75.90.7:22-139.178.68.195:55334.service. Feb 13 01:45:27.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-147.75.90.7:22-139.178.68.195:55334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:27.423676 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 01:45:27.423772 kernel: audit: type=1130 audit(1707788727.395:946): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-147.75.90.7:22-139.178.68.195:55334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:27.538000 audit[9802]: USER_ACCT pid=9802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:27.540704 sshd[9802]: Accepted publickey for core from 139.178.68.195 port 55334 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:27.541901 sshd[9802]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:27.544353 systemd-logind[1543]: New session 72 of user core. Feb 13 01:45:27.544887 systemd[1]: Started session-72.scope. Feb 13 01:45:27.623472 sshd[9802]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:27.627476 systemd[1]: sshd@97-147.75.90.7:22-139.178.68.195:55334.service: Deactivated successfully. Feb 13 01:45:27.627916 systemd[1]: session-72.scope: Deactivated successfully. Feb 13 01:45:27.628229 systemd-logind[1543]: Session 72 logged out. Waiting for processes to exit. Feb 13 01:45:27.628555 systemd-logind[1543]: Removed session 72. Feb 13 01:45:27.540000 audit[9802]: CRED_ACQ pid=9802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:27.722372 kernel: audit: type=1101 audit(1707788727.538:947): pid=9802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:27.722466 kernel: audit: type=1103 audit(1707788727.540:948): pid=9802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:27.722512 kernel: audit: type=1006 audit(1707788727.540:949): pid=9802 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=72 res=1 Feb 13 01:45:27.540000 audit[9802]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeeb58a10 a2=3 a3=0 items=0 ppid=1 pid=9802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:27.797511 sshd[9757]: Received disconnect from 101.42.234.252 port 36986:11: Bye Bye [preauth] Feb 13 01:45:27.797511 sshd[9757]: Disconnected from authenticating user root 101.42.234.252 port 36986 [preauth] Feb 13 01:45:27.798158 systemd[1]: sshd@96-147.75.90.7:22-101.42.234.252:36986.service: Deactivated successfully. Feb 13 01:45:27.872945 kernel: audit: type=1300 audit(1707788727.540:949): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeeb58a10 a2=3 a3=0 items=0 ppid=1 pid=9802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:27.873021 kernel: audit: type=1327 audit(1707788727.540:949): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:27.540000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:27.546000 audit[9802]: USER_START pid=9802 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:27.997912 kernel: audit: type=1105 audit(1707788727.546:950): pid=9802 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:27.997969 kernel: audit: type=1103 audit(1707788727.547:951): pid=9805 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:27.547000 audit[9805]: CRED_ACQ pid=9805 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:27.622000 audit[9802]: USER_END pid=9802 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:28.182592 kernel: audit: type=1106 audit(1707788727.622:952): pid=9802 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:28.182657 kernel: audit: type=1104 audit(1707788727.622:953): pid=9802 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:27.622000 audit[9802]: CRED_DISP pid=9802 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:27.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-147.75.90.7:22-139.178.68.195:55334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:27.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.90.7:22-101.42.234.252:36986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:32.626705 systemd[1]: Started sshd@98-147.75.90.7:22-139.178.68.195:55338.service. Feb 13 01:45:32.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-147.75.90.7:22-139.178.68.195:55338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:32.653768 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:45:32.653946 kernel: audit: type=1130 audit(1707788732.625:956): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-147.75.90.7:22-139.178.68.195:55338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:32.769000 audit[9857]: USER_ACCT pid=9857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:32.771302 sshd[9857]: Accepted publickey for core from 139.178.68.195 port 55338 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:32.776865 sshd[9857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:32.786548 systemd-logind[1543]: New session 73 of user core. Feb 13 01:45:32.788808 systemd[1]: Started session-73.scope. Feb 13 01:45:32.774000 audit[9857]: CRED_ACQ pid=9857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:32.868663 sshd[9857]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:32.870041 systemd[1]: sshd@98-147.75.90.7:22-139.178.68.195:55338.service: Deactivated successfully. Feb 13 01:45:32.870709 systemd-logind[1543]: Session 73 logged out. Waiting for processes to exit. Feb 13 01:45:32.870715 systemd[1]: session-73.scope: Deactivated successfully. Feb 13 01:45:32.871206 systemd-logind[1543]: Removed session 73. Feb 13 01:45:32.954712 kernel: audit: type=1101 audit(1707788732.769:957): pid=9857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:32.954770 kernel: audit: type=1103 audit(1707788732.774:958): pid=9857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:32.954809 kernel: audit: type=1006 audit(1707788732.774:959): pid=9857 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=73 res=1 Feb 13 01:45:32.774000 audit[9857]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd068e7890 a2=3 a3=0 items=0 ppid=1 pid=9857 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:33.105481 kernel: audit: type=1300 audit(1707788732.774:959): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd068e7890 a2=3 a3=0 items=0 ppid=1 pid=9857 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:33.105545 kernel: audit: type=1327 audit(1707788732.774:959): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:32.774000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:32.789000 audit[9857]: USER_START pid=9857 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:33.230528 kernel: audit: type=1105 audit(1707788732.789:960): pid=9857 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:33.230570 kernel: audit: type=1103 audit(1707788732.790:961): pid=9860 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:32.790000 audit[9860]: CRED_ACQ pid=9860 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:32.867000 audit[9857]: USER_END pid=9857 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:33.415251 kernel: audit: type=1106 audit(1707788732.867:962): pid=9857 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:33.415306 kernel: audit: type=1104 audit(1707788732.867:963): pid=9857 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:32.867000 audit[9857]: CRED_DISP pid=9857 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:32.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-147.75.90.7:22-139.178.68.195:55338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:37.876200 systemd[1]: Started sshd@99-147.75.90.7:22-139.178.68.195:42798.service. Feb 13 01:45:37.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-147.75.90.7:22-139.178.68.195:42798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:37.903296 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:45:37.903436 kernel: audit: type=1130 audit(1707788737.874:965): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-147.75.90.7:22-139.178.68.195:42798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:38.019519 sshd[9884]: Accepted publickey for core from 139.178.68.195 port 42798 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:38.017000 audit[9884]: USER_ACCT pid=9884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.020911 sshd[9884]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:38.023264 systemd-logind[1543]: New session 74 of user core. Feb 13 01:45:38.023931 systemd[1]: Started session-74.scope. Feb 13 01:45:38.102134 sshd[9884]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:38.103331 systemd[1]: sshd@99-147.75.90.7:22-139.178.68.195:42798.service: Deactivated successfully. Feb 13 01:45:38.103933 systemd-logind[1543]: Session 74 logged out. Waiting for processes to exit. Feb 13 01:45:38.103945 systemd[1]: session-74.scope: Deactivated successfully. Feb 13 01:45:38.104439 systemd-logind[1543]: Removed session 74. Feb 13 01:45:38.019000 audit[9884]: CRED_ACQ pid=9884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.201462 kernel: audit: type=1101 audit(1707788738.017:966): pid=9884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.201533 kernel: audit: type=1103 audit(1707788738.019:967): pid=9884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.201577 kernel: audit: type=1006 audit(1707788738.019:968): pid=9884 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=74 res=1 Feb 13 01:45:38.019000 audit[9884]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9ef08970 a2=3 a3=0 items=0 ppid=1 pid=9884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:38.352032 kernel: audit: type=1300 audit(1707788738.019:968): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9ef08970 a2=3 a3=0 items=0 ppid=1 pid=9884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:38.352093 kernel: audit: type=1327 audit(1707788738.019:968): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:38.019000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:38.024000 audit[9884]: USER_START pid=9884 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.476947 kernel: audit: type=1105 audit(1707788738.024:969): pid=9884 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.477010 kernel: audit: type=1103 audit(1707788738.025:970): pid=9888 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.025000 audit[9888]: CRED_ACQ pid=9888 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.101000 audit[9884]: USER_END pid=9884 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.661509 kernel: audit: type=1106 audit(1707788738.101:971): pid=9884 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.661561 kernel: audit: type=1104 audit(1707788738.101:972): pid=9884 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.101000 audit[9884]: CRED_DISP pid=9884 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:38.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-147.75.90.7:22-139.178.68.195:42798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:43.108501 systemd[1]: Started sshd@100-147.75.90.7:22-139.178.68.195:42812.service. Feb 13 01:45:43.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-147.75.90.7:22-139.178.68.195:42812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:43.135448 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:45:43.135567 kernel: audit: type=1130 audit(1707788743.106:974): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-147.75.90.7:22-139.178.68.195:42812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:43.250000 audit[9915]: USER_ACCT pid=9915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.252299 sshd[9915]: Accepted publickey for core from 139.178.68.195 port 42812 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:43.253385 sshd[9915]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:43.256183 systemd-logind[1543]: New session 75 of user core. Feb 13 01:45:43.256691 systemd[1]: Started session-75.scope. Feb 13 01:45:43.335675 sshd[9915]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:43.337246 systemd[1]: sshd@100-147.75.90.7:22-139.178.68.195:42812.service: Deactivated successfully. Feb 13 01:45:43.338028 systemd[1]: session-75.scope: Deactivated successfully. Feb 13 01:45:43.338074 systemd-logind[1543]: Session 75 logged out. Waiting for processes to exit. Feb 13 01:45:43.338534 systemd-logind[1543]: Removed session 75. Feb 13 01:45:43.251000 audit[9915]: CRED_ACQ pid=9915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.436210 kernel: audit: type=1101 audit(1707788743.250:975): pid=9915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.436255 kernel: audit: type=1103 audit(1707788743.251:976): pid=9915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.436272 kernel: audit: type=1006 audit(1707788743.251:977): pid=9915 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=75 res=1 Feb 13 01:45:43.494698 kernel: audit: type=1300 audit(1707788743.251:977): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd259b27f0 a2=3 a3=0 items=0 ppid=1 pid=9915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:43.251000 audit[9915]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd259b27f0 a2=3 a3=0 items=0 ppid=1 pid=9915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:43.586699 kernel: audit: type=1327 audit(1707788743.251:977): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:43.251000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:43.617090 kernel: audit: type=1105 audit(1707788743.257:978): pid=9915 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.257000 audit[9915]: USER_START pid=9915 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.711456 kernel: audit: type=1103 audit(1707788743.257:979): pid=9918 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.257000 audit[9918]: CRED_ACQ pid=9918 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.334000 audit[9915]: USER_END pid=9915 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.896082 kernel: audit: type=1106 audit(1707788743.334:980): pid=9915 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.896168 kernel: audit: type=1104 audit(1707788743.334:981): pid=9915 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.334000 audit[9915]: CRED_DISP pid=9915 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:43.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-147.75.90.7:22-139.178.68.195:42812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:48.342835 systemd[1]: Started sshd@101-147.75.90.7:22-139.178.68.195:50734.service. Feb 13 01:45:48.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-147.75.90.7:22-139.178.68.195:50734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:48.370195 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:45:48.370253 kernel: audit: type=1130 audit(1707788748.341:983): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-147.75.90.7:22-139.178.68.195:50734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:48.485000 audit[9942]: USER_ACCT pid=9942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:48.487632 sshd[9942]: Accepted publickey for core from 139.178.68.195 port 50734 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:48.488925 sshd[9942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:48.491326 systemd-logind[1543]: New session 76 of user core. Feb 13 01:45:48.491794 systemd[1]: Started session-76.scope. Feb 13 01:45:48.570638 sshd[9942]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:48.572025 systemd[1]: sshd@101-147.75.90.7:22-139.178.68.195:50734.service: Deactivated successfully. Feb 13 01:45:48.572594 systemd-logind[1543]: Session 76 logged out. Waiting for processes to exit. Feb 13 01:45:48.572626 systemd[1]: session-76.scope: Deactivated successfully. Feb 13 01:45:48.573099 systemd-logind[1543]: Removed session 76. Feb 13 01:45:48.487000 audit[9942]: CRED_ACQ pid=9942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:48.669359 kernel: audit: type=1101 audit(1707788748.485:984): pid=9942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:48.669397 kernel: audit: type=1103 audit(1707788748.487:985): pid=9942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:48.669414 kernel: audit: type=1006 audit(1707788748.487:986): pid=9942 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=76 res=1 Feb 13 01:45:48.727896 kernel: audit: type=1300 audit(1707788748.487:986): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef8c21bc0 a2=3 a3=0 items=0 ppid=1 pid=9942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:48.487000 audit[9942]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef8c21bc0 a2=3 a3=0 items=0 ppid=1 pid=9942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:48.819938 kernel: audit: type=1327 audit(1707788748.487:986): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:48.487000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:48.850420 kernel: audit: type=1105 audit(1707788748.492:987): pid=9942 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:48.492000 audit[9942]: USER_START pid=9942 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:48.944923 kernel: audit: type=1103 audit(1707788748.492:988): pid=9945 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:48.492000 audit[9945]: CRED_ACQ pid=9945 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:49.034105 kernel: audit: type=1106 audit(1707788748.569:989): pid=9942 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:48.569000 audit[9942]: USER_END pid=9942 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:49.129641 kernel: audit: type=1104 audit(1707788748.569:990): pid=9942 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:48.569000 audit[9942]: CRED_DISP pid=9942 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:48.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-147.75.90.7:22-139.178.68.195:50734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:49.957227 systemd[1]: Started sshd@102-147.75.90.7:22-124.221.122.203:34548.service. Feb 13 01:45:49.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-147.75.90.7:22-124.221.122.203:34548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:50.809675 sshd[9969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.122.203 user=root Feb 13 01:45:50.809000 audit[9969]: USER_AUTH pid=9969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.122.203 addr=124.221.122.203 terminal=ssh res=failed' Feb 13 01:45:52.601215 sshd[8821]: Timeout before authentication for 124.221.203.42 port 42218 Feb 13 01:45:52.603052 systemd[1]: sshd@67-147.75.90.7:22-124.221.203.42:42218.service: Deactivated successfully. Feb 13 01:45:52.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.90.7:22-124.221.203.42:42218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:53.190449 sshd[9969]: Failed password for root from 124.221.122.203 port 34548 ssh2 Feb 13 01:45:53.578923 systemd[1]: Started sshd@103-147.75.90.7:22-139.178.68.195:50740.service. Feb 13 01:45:53.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-147.75.90.7:22-139.178.68.195:50740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:53.606674 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 01:45:53.606740 kernel: audit: type=1130 audit(1707788753.578:995): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-147.75.90.7:22-139.178.68.195:50740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:53.723000 audit[10012]: USER_ACCT pid=10012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:53.724206 sshd[10012]: Accepted publickey for core from 139.178.68.195 port 50740 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:53.726803 sshd[10012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:53.729305 systemd-logind[1543]: New session 77 of user core. Feb 13 01:45:53.729743 systemd[1]: Started session-77.scope. Feb 13 01:45:53.807036 sshd[10012]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:53.808310 systemd[1]: sshd@103-147.75.90.7:22-139.178.68.195:50740.service: Deactivated successfully. Feb 13 01:45:53.808936 systemd[1]: session-77.scope: Deactivated successfully. Feb 13 01:45:53.808947 systemd-logind[1543]: Session 77 logged out. Waiting for processes to exit. Feb 13 01:45:53.809386 systemd-logind[1543]: Removed session 77. Feb 13 01:45:53.725000 audit[10012]: CRED_ACQ pid=10012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:53.906358 kernel: audit: type=1101 audit(1707788753.723:996): pid=10012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:53.906399 kernel: audit: type=1103 audit(1707788753.725:997): pid=10012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:53.906416 kernel: audit: type=1006 audit(1707788753.726:998): pid=10012 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=77 res=1 Feb 13 01:45:53.726000 audit[10012]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4cc78390 a2=3 a3=0 items=0 ppid=1 pid=10012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:54.057139 kernel: audit: type=1300 audit(1707788753.726:998): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4cc78390 a2=3 a3=0 items=0 ppid=1 pid=10012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:54.057171 kernel: audit: type=1327 audit(1707788753.726:998): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:53.726000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:54.087595 kernel: audit: type=1105 audit(1707788753.731:999): pid=10012 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:53.731000 audit[10012]: USER_START pid=10012 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:54.182146 kernel: audit: type=1103 audit(1707788753.731:1000): pid=10015 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:53.731000 audit[10015]: CRED_ACQ pid=10015 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:54.271770 kernel: audit: type=1106 audit(1707788753.806:1001): pid=10012 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:53.806000 audit[10012]: USER_END pid=10012 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:54.271857 sshd[9969]: Received disconnect from 124.221.122.203 port 34548:11: Bye Bye [preauth] Feb 13 01:45:54.271857 sshd[9969]: Disconnected from authenticating user root 124.221.122.203 port 34548 [preauth] Feb 13 01:45:54.272490 systemd[1]: sshd@102-147.75.90.7:22-124.221.122.203:34548.service: Deactivated successfully. Feb 13 01:45:54.285995 systemd[1]: Started sshd@104-147.75.90.7:22-101.42.234.252:60536.service. Feb 13 01:45:54.367532 kernel: audit: type=1104 audit(1707788753.807:1002): pid=10012 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:53.807000 audit[10012]: CRED_DISP pid=10012 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:53.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-147.75.90.7:22-139.178.68.195:50740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:54.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-147.75.90.7:22-124.221.122.203:34548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:54.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-147.75.90.7:22-101.42.234.252:60536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:55.103658 sshd[10040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.234.252 user=root Feb 13 01:45:55.103000 audit[10040]: USER_AUTH pid=10040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.234.252 addr=101.42.234.252 terminal=ssh res=failed' Feb 13 01:45:57.167886 sshd[10040]: Failed password for root from 101.42.234.252 port 60536 ssh2 Feb 13 01:45:58.539062 sshd[10040]: Received disconnect from 101.42.234.252 port 60536:11: Bye Bye [preauth] Feb 13 01:45:58.539062 sshd[10040]: Disconnected from authenticating user root 101.42.234.252 port 60536 [preauth] Feb 13 01:45:58.541919 systemd[1]: sshd@104-147.75.90.7:22-101.42.234.252:60536.service: Deactivated successfully. Feb 13 01:45:58.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-147.75.90.7:22-101.42.234.252:60536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:58.814162 systemd[1]: Started sshd@105-147.75.90.7:22-139.178.68.195:43386.service. Feb 13 01:45:58.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-147.75.90.7:22-139.178.68.195:43386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:58.841307 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 01:45:58.841411 kernel: audit: type=1130 audit(1707788758.813:1008): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-147.75.90.7:22-139.178.68.195:43386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:58.957000 audit[10093]: USER_ACCT pid=10093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:58.958647 sshd[10093]: Accepted publickey for core from 139.178.68.195 port 43386 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:45:58.963544 sshd[10093]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:45:58.967750 systemd-logind[1543]: New session 78 of user core. Feb 13 01:45:58.968215 systemd[1]: Started session-78.scope. Feb 13 01:45:59.047390 sshd[10093]: pam_unix(sshd:session): session closed for user core Feb 13 01:45:59.048871 systemd[1]: sshd@105-147.75.90.7:22-139.178.68.195:43386.service: Deactivated successfully. Feb 13 01:45:59.049434 systemd-logind[1543]: Session 78 logged out. Waiting for processes to exit. Feb 13 01:45:59.049470 systemd[1]: session-78.scope: Deactivated successfully. Feb 13 01:45:59.049964 systemd-logind[1543]: Removed session 78. Feb 13 01:45:58.962000 audit[10093]: CRED_ACQ pid=10093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:59.142575 kernel: audit: type=1101 audit(1707788758.957:1009): pid=10093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:59.142620 kernel: audit: type=1103 audit(1707788758.962:1010): pid=10093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:59.142639 kernel: audit: type=1006 audit(1707788758.962:1011): pid=10093 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=78 res=1 Feb 13 01:45:59.201295 kernel: audit: type=1300 audit(1707788758.962:1011): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefd9c07a0 a2=3 a3=0 items=0 ppid=1 pid=10093 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:58.962000 audit[10093]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefd9c07a0 a2=3 a3=0 items=0 ppid=1 pid=10093 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:45:59.293513 kernel: audit: type=1327 audit(1707788758.962:1011): proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:58.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:45:59.324010 kernel: audit: type=1105 audit(1707788758.969:1012): pid=10093 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:58.969000 audit[10093]: USER_START pid=10093 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:59.418542 kernel: audit: type=1103 audit(1707788758.970:1013): pid=10096 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:58.970000 audit[10096]: CRED_ACQ pid=10096 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:59.507759 kernel: audit: type=1106 audit(1707788759.047:1014): pid=10093 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:59.047000 audit[10093]: USER_END pid=10093 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:59.047000 audit[10093]: CRED_DISP pid=10093 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:59.692595 kernel: audit: type=1104 audit(1707788759.047:1015): pid=10093 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:45:59.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-147.75.90.7:22-139.178.68.195:43386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:04.054011 systemd[1]: Started sshd@106-147.75.90.7:22-139.178.68.195:43402.service. Feb 13 01:46:04.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.90.7:22-139.178.68.195:43402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:04.081375 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:46:04.081457 kernel: audit: type=1130 audit(1707788764.053:1017): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.90.7:22-139.178.68.195:43402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:04.197000 audit[10119]: USER_ACCT pid=10119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.198423 sshd[10119]: Accepted publickey for core from 139.178.68.195 port 43402 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:04.199579 sshd[10119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:04.201697 systemd-logind[1543]: New session 79 of user core. Feb 13 01:46:04.202366 systemd[1]: Started session-79.scope. Feb 13 01:46:04.280988 sshd[10119]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:04.282202 systemd[1]: sshd@106-147.75.90.7:22-139.178.68.195:43402.service: Deactivated successfully. Feb 13 01:46:04.282787 systemd-logind[1543]: Session 79 logged out. Waiting for processes to exit. Feb 13 01:46:04.282830 systemd[1]: session-79.scope: Deactivated successfully. Feb 13 01:46:04.283268 systemd-logind[1543]: Removed session 79. Feb 13 01:46:04.198000 audit[10119]: CRED_ACQ pid=10119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.380530 kernel: audit: type=1101 audit(1707788764.197:1018): pid=10119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.380564 kernel: audit: type=1103 audit(1707788764.198:1019): pid=10119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.380583 kernel: audit: type=1006 audit(1707788764.198:1020): pid=10119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=79 res=1 Feb 13 01:46:04.439140 kernel: audit: type=1300 audit(1707788764.198:1020): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0fae1ec0 a2=3 a3=0 items=0 ppid=1 pid=10119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:04.198000 audit[10119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0fae1ec0 a2=3 a3=0 items=0 ppid=1 pid=10119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:04.531094 kernel: audit: type=1327 audit(1707788764.198:1020): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:04.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:04.561550 kernel: audit: type=1105 audit(1707788764.203:1021): pid=10119 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.203000 audit[10119]: USER_START pid=10119 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.655947 kernel: audit: type=1103 audit(1707788764.204:1022): pid=10122 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.204000 audit[10122]: CRED_ACQ pid=10122 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.745067 kernel: audit: type=1106 audit(1707788764.280:1023): pid=10119 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.280000 audit[10119]: USER_END pid=10119 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.781543 systemd[1]: Started sshd@107-147.75.90.7:22-124.221.203.42:36456.service. Feb 13 01:46:04.840508 kernel: audit: type=1104 audit(1707788764.280:1024): pid=10119 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.280000 audit[10119]: CRED_DISP pid=10119 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:04.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.90.7:22-139.178.68.195:43402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:04.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.90.7:22-124.221.203.42:36456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:09.288159 systemd[1]: Started sshd@108-147.75.90.7:22-139.178.68.195:57114.service. Feb 13 01:46:09.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.90.7:22-139.178.68.195:57114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:09.315379 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:46:09.315465 kernel: audit: type=1130 audit(1707788769.287:1027): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.90.7:22-139.178.68.195:57114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:09.429000 audit[10148]: USER_ACCT pid=10148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.430591 sshd[10148]: Accepted publickey for core from 139.178.68.195 port 57114 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:09.431150 sshd[10148]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:09.433521 systemd-logind[1543]: New session 80 of user core. Feb 13 01:46:09.433966 systemd[1]: Started session-80.scope. Feb 13 01:46:09.511201 sshd[10148]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:09.512657 systemd[1]: sshd@108-147.75.90.7:22-139.178.68.195:57114.service: Deactivated successfully. Feb 13 01:46:09.513315 systemd[1]: session-80.scope: Deactivated successfully. Feb 13 01:46:09.513347 systemd-logind[1543]: Session 80 logged out. Waiting for processes to exit. Feb 13 01:46:09.513818 systemd-logind[1543]: Removed session 80. Feb 13 01:46:09.430000 audit[10148]: CRED_ACQ pid=10148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.612461 kernel: audit: type=1101 audit(1707788769.429:1028): pid=10148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.612509 kernel: audit: type=1103 audit(1707788769.430:1029): pid=10148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.612534 kernel: audit: type=1006 audit(1707788769.430:1030): pid=10148 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=80 res=1 Feb 13 01:46:09.671101 kernel: audit: type=1300 audit(1707788769.430:1030): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2d0431c0 a2=3 a3=0 items=0 ppid=1 pid=10148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:09.430000 audit[10148]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2d0431c0 a2=3 a3=0 items=0 ppid=1 pid=10148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:09.763111 kernel: audit: type=1327 audit(1707788769.430:1030): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:09.430000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:09.793565 kernel: audit: type=1105 audit(1707788769.435:1031): pid=10148 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.435000 audit[10148]: USER_START pid=10148 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.888013 kernel: audit: type=1103 audit(1707788769.436:1032): pid=10151 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.436000 audit[10151]: CRED_ACQ pid=10151 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.977189 kernel: audit: type=1106 audit(1707788769.511:1033): pid=10148 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.511000 audit[10148]: USER_END pid=10148 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:10.072688 kernel: audit: type=1104 audit(1707788769.511:1034): pid=10148 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.511000 audit[10148]: CRED_DISP pid=10148 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:09.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.90.7:22-139.178.68.195:57114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:14.517404 systemd[1]: Started sshd@109-147.75.90.7:22-139.178.68.195:57128.service. Feb 13 01:46:14.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.90.7:22-139.178.68.195:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:14.544441 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:46:14.544514 kernel: audit: type=1130 audit(1707788774.516:1036): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.90.7:22-139.178.68.195:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:14.660000 audit[10174]: USER_ACCT pid=10174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:14.661733 sshd[10174]: Accepted publickey for core from 139.178.68.195 port 57128 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:14.662781 sshd[10174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:14.665305 systemd-logind[1543]: New session 81 of user core. Feb 13 01:46:14.665855 systemd[1]: Started session-81.scope. Feb 13 01:46:14.744278 sshd[10174]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:14.745756 systemd[1]: sshd@109-147.75.90.7:22-139.178.68.195:57128.service: Deactivated successfully. Feb 13 01:46:14.746431 systemd-logind[1543]: Session 81 logged out. Waiting for processes to exit. Feb 13 01:46:14.746434 systemd[1]: session-81.scope: Deactivated successfully. Feb 13 01:46:14.747017 systemd-logind[1543]: Removed session 81. Feb 13 01:46:14.661000 audit[10174]: CRED_ACQ pid=10174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:14.845783 kernel: audit: type=1101 audit(1707788774.660:1037): pid=10174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:14.845825 kernel: audit: type=1103 audit(1707788774.661:1038): pid=10174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:14.845844 kernel: audit: type=1006 audit(1707788774.662:1039): pid=10174 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=81 res=1 Feb 13 01:46:14.662000 audit[10174]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6002a700 a2=3 a3=0 items=0 ppid=1 pid=10174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:14.904644 kernel: audit: type=1300 audit(1707788774.662:1039): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6002a700 a2=3 a3=0 items=0 ppid=1 pid=10174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:14.662000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:15.027067 kernel: audit: type=1327 audit(1707788774.662:1039): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:15.027098 kernel: audit: type=1105 audit(1707788774.667:1040): pid=10174 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:14.667000 audit[10174]: USER_START pid=10174 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:15.121572 kernel: audit: type=1103 audit(1707788774.668:1041): pid=10177 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:14.668000 audit[10177]: CRED_ACQ pid=10177 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:14.744000 audit[10174]: USER_END pid=10174 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:15.211691 kernel: audit: type=1106 audit(1707788774.744:1042): pid=10174 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:14.744000 audit[10174]: CRED_DISP pid=10174 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:15.395975 kernel: audit: type=1104 audit(1707788774.744:1043): pid=10174 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:14.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.90.7:22-139.178.68.195:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:19.751825 systemd[1]: Started sshd@110-147.75.90.7:22-139.178.68.195:50192.service. Feb 13 01:46:19.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.90.7:22-139.178.68.195:50192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:19.778776 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:46:19.778834 kernel: audit: type=1130 audit(1707788779.751:1045): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.90.7:22-139.178.68.195:50192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:19.895000 audit[10201]: USER_ACCT pid=10201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:19.896647 sshd[10201]: Accepted publickey for core from 139.178.68.195 port 50192 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:19.899855 sshd[10201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:19.905160 systemd-logind[1543]: New session 82 of user core. Feb 13 01:46:19.905648 systemd[1]: Started session-82.scope. Feb 13 01:46:19.983563 sshd[10201]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:19.984984 systemd[1]: sshd@110-147.75.90.7:22-139.178.68.195:50192.service: Deactivated successfully. Feb 13 01:46:19.985557 systemd-logind[1543]: Session 82 logged out. Waiting for processes to exit. Feb 13 01:46:19.985566 systemd[1]: session-82.scope: Deactivated successfully. Feb 13 01:46:19.986093 systemd-logind[1543]: Removed session 82. Feb 13 01:46:19.898000 audit[10201]: CRED_ACQ pid=10201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:20.079465 kernel: audit: type=1101 audit(1707788779.895:1046): pid=10201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:20.079500 kernel: audit: type=1103 audit(1707788779.898:1047): pid=10201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:20.079521 kernel: audit: type=1006 audit(1707788779.898:1048): pid=10201 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=82 res=1 Feb 13 01:46:20.138128 kernel: audit: type=1300 audit(1707788779.898:1048): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe70932510 a2=3 a3=0 items=0 ppid=1 pid=10201 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:19.898000 audit[10201]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe70932510 a2=3 a3=0 items=0 ppid=1 pid=10201 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:20.230162 kernel: audit: type=1327 audit(1707788779.898:1048): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:19.898000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:20.260666 kernel: audit: type=1105 audit(1707788779.907:1049): pid=10201 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:19.907000 audit[10201]: USER_START pid=10201 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:20.355161 kernel: audit: type=1103 audit(1707788779.908:1050): pid=10204 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:19.908000 audit[10204]: CRED_ACQ pid=10204 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:20.444378 kernel: audit: type=1106 audit(1707788779.983:1051): pid=10201 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:19.983000 audit[10201]: USER_END pid=10201 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:20.540024 kernel: audit: type=1104 audit(1707788779.983:1052): pid=10201 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:19.983000 audit[10201]: CRED_DISP pid=10201 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:19.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.90.7:22-139.178.68.195:50192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:24.571706 systemd[1]: Started sshd@111-147.75.90.7:22-124.221.122.203:42940.service. Feb 13 01:46:24.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.90.7:22-124.221.122.203:42940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:24.991158 systemd[1]: Started sshd@112-147.75.90.7:22-139.178.68.195:50208.service. Feb 13 01:46:24.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.90.7:22-139.178.68.195:50208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:25.018239 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:46:25.018338 kernel: audit: type=1130 audit(1707788784.990:1055): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.90.7:22-139.178.68.195:50208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:25.045016 sshd[10266]: Accepted publickey for core from 139.178.68.195 port 50208 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:25.046910 sshd[10266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:25.049360 systemd-logind[1543]: New session 83 of user core. Feb 13 01:46:25.050372 systemd[1]: Started session-83.scope. Feb 13 01:46:25.044000 audit[10266]: USER_ACCT pid=10266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.130725 sshd[10266]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:25.132085 systemd[1]: sshd@112-147.75.90.7:22-139.178.68.195:50208.service: Deactivated successfully. Feb 13 01:46:25.132791 systemd[1]: session-83.scope: Deactivated successfully. Feb 13 01:46:25.132807 systemd-logind[1543]: Session 83 logged out. Waiting for processes to exit. Feb 13 01:46:25.133469 systemd-logind[1543]: Removed session 83. Feb 13 01:46:25.200397 kernel: audit: type=1101 audit(1707788785.044:1056): pid=10266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.200431 kernel: audit: type=1103 audit(1707788785.046:1057): pid=10266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.046000 audit[10266]: CRED_ACQ pid=10266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.290992 kernel: audit: type=1006 audit(1707788785.046:1058): pid=10266 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=83 res=1 Feb 13 01:46:25.349624 kernel: audit: type=1300 audit(1707788785.046:1058): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0422adc0 a2=3 a3=0 items=0 ppid=1 pid=10266 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:25.046000 audit[10266]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0422adc0 a2=3 a3=0 items=0 ppid=1 pid=10266 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:25.398522 sshd[10264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.122.203 user=root Feb 13 01:46:25.441606 kernel: audit: type=1327 audit(1707788785.046:1058): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:25.046000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:25.472072 kernel: audit: type=1105 audit(1707788785.052:1059): pid=10266 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.052000 audit[10266]: USER_START pid=10266 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.566680 kernel: audit: type=1103 audit(1707788785.052:1060): pid=10269 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.052000 audit[10269]: CRED_ACQ pid=10269 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.655856 kernel: audit: type=1106 audit(1707788785.130:1061): pid=10266 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.130000 audit[10266]: USER_END pid=10266 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.751341 kernel: audit: type=1104 audit(1707788785.130:1062): pid=10266 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.130000 audit[10266]: CRED_DISP pid=10266 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:25.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.90.7:22-139.178.68.195:50208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:25.398000 audit[10264]: USER_AUTH pid=10264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.122.203 addr=124.221.122.203 terminal=ssh res=failed' Feb 13 01:46:26.209754 systemd[1]: Started sshd@113-147.75.90.7:22-101.42.234.252:35398.service. Feb 13 01:46:26.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.90.7:22-101.42.234.252:35398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:27.054916 sshd[10329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.234.252 user=root Feb 13 01:46:27.054000 audit[10329]: USER_AUTH pid=10329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.234.252 addr=101.42.234.252 terminal=ssh res=failed' Feb 13 01:46:27.583664 sshd[10264]: Failed password for root from 124.221.122.203 port 42940 ssh2 Feb 13 01:46:28.832928 sshd[10264]: Received disconnect from 124.221.122.203 port 42940:11: Bye Bye [preauth] Feb 13 01:46:28.832928 sshd[10264]: Disconnected from authenticating user root 124.221.122.203 port 42940 [preauth] Feb 13 01:46:28.835500 systemd[1]: sshd@111-147.75.90.7:22-124.221.122.203:42940.service: Deactivated successfully. Feb 13 01:46:28.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.90.7:22-124.221.122.203:42940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:29.179967 sshd[10329]: Failed password for root from 101.42.234.252 port 35398 ssh2 Feb 13 01:46:30.137956 systemd[1]: Started sshd@114-147.75.90.7:22-139.178.68.195:58252.service. Feb 13 01:46:30.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.90.7:22-139.178.68.195:58252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:30.164831 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 01:46:30.164887 kernel: audit: type=1130 audit(1707788790.137:1068): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.90.7:22-139.178.68.195:58252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:30.281000 audit[10371]: USER_ACCT pid=10371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.282673 sshd[10371]: Accepted publickey for core from 139.178.68.195 port 58252 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:30.286862 sshd[10371]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:30.291303 systemd-logind[1543]: New session 84 of user core. Feb 13 01:46:30.291694 systemd[1]: Started session-84.scope. Feb 13 01:46:30.369676 sshd[10371]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:30.371011 systemd[1]: sshd@114-147.75.90.7:22-139.178.68.195:58252.service: Deactivated successfully. Feb 13 01:46:30.371552 systemd-logind[1543]: Session 84 logged out. Waiting for processes to exit. Feb 13 01:46:30.371589 systemd[1]: session-84.scope: Deactivated successfully. Feb 13 01:46:30.372131 systemd-logind[1543]: Removed session 84. Feb 13 01:46:30.285000 audit[10371]: CRED_ACQ pid=10371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.464284 kernel: audit: type=1101 audit(1707788790.281:1069): pid=10371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.464323 kernel: audit: type=1103 audit(1707788790.285:1070): pid=10371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.464340 kernel: audit: type=1006 audit(1707788790.285:1071): pid=10371 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=84 res=1 Feb 13 01:46:30.490342 sshd[10329]: Received disconnect from 101.42.234.252 port 35398:11: Bye Bye [preauth] Feb 13 01:46:30.490342 sshd[10329]: Disconnected from authenticating user root 101.42.234.252 port 35398 [preauth] Feb 13 01:46:30.490848 systemd[1]: sshd@113-147.75.90.7:22-101.42.234.252:35398.service: Deactivated successfully. Feb 13 01:46:30.285000 audit[10371]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2bee5d30 a2=3 a3=0 items=0 ppid=1 pid=10371 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:30.614986 kernel: audit: type=1300 audit(1707788790.285:1071): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2bee5d30 a2=3 a3=0 items=0 ppid=1 pid=10371 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:30.615027 kernel: audit: type=1327 audit(1707788790.285:1071): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:30.285000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:30.645447 kernel: audit: type=1105 audit(1707788790.293:1072): pid=10371 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.293000 audit[10371]: USER_START pid=10371 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.739961 kernel: audit: type=1103 audit(1707788790.293:1073): pid=10374 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.293000 audit[10374]: CRED_ACQ pid=10374 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.829162 kernel: audit: type=1106 audit(1707788790.369:1074): pid=10371 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.369000 audit[10371]: USER_END pid=10371 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.924631 kernel: audit: type=1104 audit(1707788790.369:1075): pid=10371 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.369000 audit[10371]: CRED_DISP pid=10371 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:30.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.90.7:22-139.178.68.195:58252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:30.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.90.7:22-101.42.234.252:35398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:35.376272 systemd[1]: Started sshd@115-147.75.90.7:22-139.178.68.195:58268.service. Feb 13 01:46:35.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.90.7:22-139.178.68.195:58268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:35.403327 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:46:35.403426 kernel: audit: type=1130 audit(1707788795.375:1078): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.90.7:22-139.178.68.195:58268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:35.518000 audit[10399]: USER_ACCT pid=10399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:35.519174 sshd[10399]: Accepted publickey for core from 139.178.68.195 port 58268 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:35.520922 sshd[10399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:35.523258 systemd-logind[1543]: New session 85 of user core. Feb 13 01:46:35.523917 systemd[1]: Started session-85.scope. Feb 13 01:46:35.520000 audit[10399]: CRED_ACQ pid=10399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:35.701163 kernel: audit: type=1101 audit(1707788795.518:1079): pid=10399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:35.701202 kernel: audit: type=1103 audit(1707788795.520:1080): pid=10399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:35.701221 kernel: audit: type=1006 audit(1707788795.520:1081): pid=10399 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=85 res=1 Feb 13 01:46:35.759817 kernel: audit: type=1300 audit(1707788795.520:1081): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa2d6f20 a2=3 a3=0 items=0 ppid=1 pid=10399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:35.520000 audit[10399]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa2d6f20 a2=3 a3=0 items=0 ppid=1 pid=10399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:35.520000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:35.852046 sshd[10399]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:35.853355 systemd[1]: sshd@115-147.75.90.7:22-139.178.68.195:58268.service: Deactivated successfully. Feb 13 01:46:35.853947 systemd-logind[1543]: Session 85 logged out. Waiting for processes to exit. Feb 13 01:46:35.854007 systemd[1]: session-85.scope: Deactivated successfully. Feb 13 01:46:35.854467 systemd-logind[1543]: Removed session 85. Feb 13 01:46:35.882379 kernel: audit: type=1327 audit(1707788795.520:1081): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:35.882413 kernel: audit: type=1105 audit(1707788795.525:1082): pid=10399 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:35.525000 audit[10399]: USER_START pid=10399 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:35.976839 kernel: audit: type=1103 audit(1707788795.526:1083): pid=10402 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:35.526000 audit[10402]: CRED_ACQ pid=10402 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:36.066011 kernel: audit: type=1106 audit(1707788795.852:1084): pid=10399 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:35.852000 audit[10399]: USER_END pid=10399 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:36.161444 kernel: audit: type=1104 audit(1707788795.852:1085): pid=10399 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:35.852000 audit[10399]: CRED_DISP pid=10399 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:35.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.90.7:22-139.178.68.195:58268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:38.947855 sshd[9360]: Timeout before authentication for 124.221.203.42 port 49706 Feb 13 01:46:38.949252 systemd[1]: sshd@83-147.75.90.7:22-124.221.203.42:49706.service: Deactivated successfully. Feb 13 01:46:38.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.90.7:22-124.221.203.42:49706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:40.799799 systemd[1]: Started sshd@116-147.75.90.7:22-139.178.68.195:44370.service. Feb 13 01:46:40.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.90.7:22-139.178.68.195:44370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:40.826884 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:46:40.826969 kernel: audit: type=1130 audit(1707788800.799:1088): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.90.7:22-139.178.68.195:44370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:40.943000 audit[10430]: USER_ACCT pid=10430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:40.944103 sshd[10430]: Accepted publickey for core from 139.178.68.195 port 44370 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:40.945284 sshd[10430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:40.947554 systemd-logind[1543]: New session 86 of user core. Feb 13 01:46:40.948354 systemd[1]: Started session-86.scope. Feb 13 01:46:41.026925 sshd[10430]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:41.028254 systemd[1]: sshd@116-147.75.90.7:22-139.178.68.195:44370.service: Deactivated successfully. Feb 13 01:46:41.028941 systemd[1]: session-86.scope: Deactivated successfully. Feb 13 01:46:41.028951 systemd-logind[1543]: Session 86 logged out. Waiting for processes to exit. Feb 13 01:46:41.029521 systemd-logind[1543]: Removed session 86. Feb 13 01:46:40.944000 audit[10430]: CRED_ACQ pid=10430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:41.125902 kernel: audit: type=1101 audit(1707788800.943:1089): pid=10430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:41.125939 kernel: audit: type=1103 audit(1707788800.944:1090): pid=10430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:41.125958 kernel: audit: type=1006 audit(1707788800.944:1091): pid=10430 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=86 res=1 Feb 13 01:46:41.184504 kernel: audit: type=1300 audit(1707788800.944:1091): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc91566820 a2=3 a3=0 items=0 ppid=1 pid=10430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:40.944000 audit[10430]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc91566820 a2=3 a3=0 items=0 ppid=1 pid=10430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:41.276435 kernel: audit: type=1327 audit(1707788800.944:1091): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:40.944000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:41.306860 kernel: audit: type=1105 audit(1707788800.949:1092): pid=10430 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:40.949000 audit[10430]: USER_START pid=10430 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:41.401223 kernel: audit: type=1103 audit(1707788800.950:1093): pid=10433 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:40.950000 audit[10433]: CRED_ACQ pid=10433 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:41.490341 kernel: audit: type=1106 audit(1707788801.026:1094): pid=10430 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:41.026000 audit[10430]: USER_END pid=10430 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:41.585757 kernel: audit: type=1104 audit(1707788801.026:1095): pid=10430 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:41.026000 audit[10430]: CRED_DISP pid=10430 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:41.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.90.7:22-139.178.68.195:44370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:46.035376 systemd[1]: Started sshd@117-147.75.90.7:22-139.178.68.195:44374.service. Feb 13 01:46:46.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.90.7:22-139.178.68.195:44374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:46.062823 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:46:46.062930 kernel: audit: type=1130 audit(1707788806.035:1097): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.90.7:22-139.178.68.195:44374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:46.179000 audit[10472]: USER_ACCT pid=10472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.180140 sshd[10472]: Accepted publickey for core from 139.178.68.195 port 44374 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:46.180904 sshd[10472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:46.183331 systemd-logind[1543]: New session 87 of user core. Feb 13 01:46:46.183819 systemd[1]: Started session-87.scope. Feb 13 01:46:46.260948 sshd[10472]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:46.262331 systemd[1]: sshd@117-147.75.90.7:22-139.178.68.195:44374.service: Deactivated successfully. Feb 13 01:46:46.262963 systemd[1]: session-87.scope: Deactivated successfully. Feb 13 01:46:46.262973 systemd-logind[1543]: Session 87 logged out. Waiting for processes to exit. Feb 13 01:46:46.263469 systemd-logind[1543]: Removed session 87. Feb 13 01:46:46.180000 audit[10472]: CRED_ACQ pid=10472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.362036 kernel: audit: type=1101 audit(1707788806.179:1098): pid=10472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.362074 kernel: audit: type=1103 audit(1707788806.180:1099): pid=10472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.362093 kernel: audit: type=1006 audit(1707788806.180:1100): pid=10472 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=87 res=1 Feb 13 01:46:46.420654 kernel: audit: type=1300 audit(1707788806.180:1100): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8eef9490 a2=3 a3=0 items=0 ppid=1 pid=10472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:46.180000 audit[10472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8eef9490 a2=3 a3=0 items=0 ppid=1 pid=10472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:46.512616 kernel: audit: type=1327 audit(1707788806.180:1100): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:46.180000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:46.543065 kernel: audit: type=1105 audit(1707788806.185:1101): pid=10472 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.185000 audit[10472]: USER_START pid=10472 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.637486 kernel: audit: type=1103 audit(1707788806.186:1102): pid=10475 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.186000 audit[10475]: CRED_ACQ pid=10475 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.726647 kernel: audit: type=1106 audit(1707788806.261:1103): pid=10472 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.261000 audit[10472]: USER_END pid=10472 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.822125 kernel: audit: type=1104 audit(1707788806.261:1104): pid=10472 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.261000 audit[10472]: CRED_DISP pid=10472 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:46.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.90.7:22-139.178.68.195:44374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:49.260771 systemd[1]: Started sshd@118-147.75.90.7:22-124.221.203.42:43946.service. Feb 13 01:46:49.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.90.7:22-124.221.203.42:43946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:50.132229 sshd[10500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.203.42 user=root Feb 13 01:46:50.131000 audit[10500]: USER_AUTH pid=10500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.203.42 addr=124.221.203.42 terminal=ssh res=failed' Feb 13 01:46:51.268330 systemd[1]: Started sshd@119-147.75.90.7:22-139.178.68.195:52424.service. Feb 13 01:46:51.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.90.7:22-139.178.68.195:52424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:51.295347 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 01:46:51.295437 kernel: audit: type=1130 audit(1707788811.266:1108): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.90.7:22-139.178.68.195:52424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:51.410000 audit[10541]: USER_ACCT pid=10541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:51.411264 sshd[10541]: Accepted publickey for core from 139.178.68.195 port 52424 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:51.412875 sshd[10541]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:51.415272 systemd-logind[1543]: New session 88 of user core. Feb 13 01:46:51.415810 systemd[1]: Started session-88.scope. Feb 13 01:46:51.496991 sshd[10541]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:51.498366 systemd[1]: sshd@119-147.75.90.7:22-139.178.68.195:52424.service: Deactivated successfully. Feb 13 01:46:51.498988 systemd[1]: session-88.scope: Deactivated successfully. Feb 13 01:46:51.499028 systemd-logind[1543]: Session 88 logged out. Waiting for processes to exit. Feb 13 01:46:51.499517 systemd-logind[1543]: Removed session 88. Feb 13 01:46:51.411000 audit[10541]: CRED_ACQ pid=10541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:51.593190 kernel: audit: type=1101 audit(1707788811.410:1109): pid=10541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:51.593225 kernel: audit: type=1103 audit(1707788811.411:1110): pid=10541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:51.593241 kernel: audit: type=1006 audit(1707788811.411:1111): pid=10541 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=88 res=1 Feb 13 01:46:51.651827 kernel: audit: type=1300 audit(1707788811.411:1111): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd003d0a10 a2=3 a3=0 items=0 ppid=1 pid=10541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:51.411000 audit[10541]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd003d0a10 a2=3 a3=0 items=0 ppid=1 pid=10541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:51.743941 kernel: audit: type=1327 audit(1707788811.411:1111): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:51.411000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:51.774400 kernel: audit: type=1105 audit(1707788811.416:1112): pid=10541 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:51.416000 audit[10541]: USER_START pid=10541 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:51.868843 kernel: audit: type=1103 audit(1707788811.416:1113): pid=10544 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:51.416000 audit[10544]: CRED_ACQ pid=10544 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:51.958028 kernel: audit: type=1106 audit(1707788811.496:1114): pid=10541 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:51.496000 audit[10541]: USER_END pid=10541 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:52.053513 kernel: audit: type=1104 audit(1707788811.496:1115): pid=10541 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:51.496000 audit[10541]: CRED_DISP pid=10541 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:52.080767 sshd[10500]: Failed password for root from 124.221.203.42 port 43946 ssh2 Feb 13 01:46:51.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.90.7:22-139.178.68.195:52424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:53.575984 sshd[10500]: Received disconnect from 124.221.203.42 port 43946:11: Bye Bye [preauth] Feb 13 01:46:53.575984 sshd[10500]: Disconnected from authenticating user root 124.221.203.42 port 43946 [preauth] Feb 13 01:46:53.578505 systemd[1]: sshd@118-147.75.90.7:22-124.221.203.42:43946.service: Deactivated successfully. Feb 13 01:46:53.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.90.7:22-124.221.203.42:43946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:56.469961 systemd[1]: Started sshd@120-147.75.90.7:22-101.42.234.252:45520.service. Feb 13 01:46:56.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.90.7:22-101.42.234.252:45520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:56.496312 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:46:56.496355 kernel: audit: type=1130 audit(1707788816.468:1118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.90.7:22-101.42.234.252:45520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:56.499299 systemd[1]: Started sshd@121-147.75.90.7:22-139.178.68.195:60286.service. Feb 13 01:46:56.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.90.7:22-139.178.68.195:60286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:56.611754 sshd[10590]: Accepted publickey for core from 139.178.68.195 port 60286 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:46:56.612900 sshd[10590]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:46:56.615320 systemd-logind[1543]: New session 89 of user core. Feb 13 01:46:56.615748 systemd[1]: Started session-89.scope. Feb 13 01:46:56.672578 kernel: audit: type=1130 audit(1707788816.497:1119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.90.7:22-139.178.68.195:60286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:56.672676 kernel: audit: type=1101 audit(1707788816.610:1120): pid=10590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:56.610000 audit[10590]: USER_ACCT pid=10590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:56.693719 sshd[10590]: pam_unix(sshd:session): session closed for user core Feb 13 01:46:56.695140 systemd[1]: sshd@121-147.75.90.7:22-139.178.68.195:60286.service: Deactivated successfully. Feb 13 01:46:56.695811 systemd[1]: session-89.scope: Deactivated successfully. Feb 13 01:46:56.695827 systemd-logind[1543]: Session 89 logged out. Waiting for processes to exit. Feb 13 01:46:56.696357 systemd-logind[1543]: Removed session 89. Feb 13 01:46:56.764869 kernel: audit: type=1103 audit(1707788816.611:1121): pid=10590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:56.611000 audit[10590]: CRED_ACQ pid=10590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:56.855541 kernel: audit: type=1006 audit(1707788816.611:1122): pid=10590 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=89 res=1 Feb 13 01:46:56.611000 audit[10590]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9f3686a0 a2=3 a3=0 items=0 ppid=1 pid=10590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:57.006115 kernel: audit: type=1300 audit(1707788816.611:1122): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9f3686a0 a2=3 a3=0 items=0 ppid=1 pid=10590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:46:57.006145 kernel: audit: type=1327 audit(1707788816.611:1122): proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:56.611000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:46:57.036580 kernel: audit: type=1105 audit(1707788816.616:1123): pid=10590 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:56.616000 audit[10590]: USER_START pid=10590 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:57.131871 kernel: audit: type=1103 audit(1707788816.616:1124): pid=10593 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:56.616000 audit[10593]: CRED_ACQ pid=10593 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:57.221099 kernel: audit: type=1106 audit(1707788816.692:1125): pid=10590 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:56.692000 audit[10590]: USER_END pid=10590 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:56.692000 audit[10590]: CRED_DISP pid=10590 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:46:56.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.90.7:22-139.178.68.195:60286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:57.557104 sshd[10588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.234.252 user=root Feb 13 01:46:57.555000 audit[10588]: USER_AUTH pid=10588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.234.252 addr=101.42.234.252 terminal=ssh res=failed' Feb 13 01:46:59.061565 systemd[1]: Started sshd@122-147.75.90.7:22-124.221.122.203:51320.service. Feb 13 01:46:59.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.90.7:22-124.221.122.203:51320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:59.134865 sshd[10588]: Failed password for root from 101.42.234.252 port 45520 ssh2 Feb 13 01:46:59.370754 sshd[10588]: Received disconnect from 101.42.234.252 port 45520:11: Bye Bye [preauth] Feb 13 01:46:59.370754 sshd[10588]: Disconnected from authenticating user root 101.42.234.252 port 45520 [preauth] Feb 13 01:46:59.373180 systemd[1]: sshd@120-147.75.90.7:22-101.42.234.252:45520.service: Deactivated successfully. Feb 13 01:46:59.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.90.7:22-101.42.234.252:45520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:59.903440 sshd[10643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.122.203 user=root Feb 13 01:46:59.902000 audit[10643]: USER_AUTH pid=10643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.122.203 addr=124.221.122.203 terminal=ssh res=failed' Feb 13 01:47:01.700473 systemd[1]: Started sshd@123-147.75.90.7:22-139.178.68.195:60302.service. Feb 13 01:47:01.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.90.7:22-139.178.68.195:60302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:01.727681 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 13 01:47:01.727734 kernel: audit: type=1130 audit(1707788821.698:1132): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.90.7:22-139.178.68.195:60302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:01.844000 audit[10650]: USER_ACCT pid=10650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:01.845177 sshd[10650]: Accepted publickey for core from 139.178.68.195 port 60302 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:47:01.846633 sshd[10650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:47:01.849093 systemd-logind[1543]: New session 90 of user core. Feb 13 01:47:01.849626 systemd[1]: Started session-90.scope. Feb 13 01:47:01.926877 sshd[10650]: pam_unix(sshd:session): session closed for user core Feb 13 01:47:01.928277 systemd[1]: sshd@123-147.75.90.7:22-139.178.68.195:60302.service: Deactivated successfully. Feb 13 01:47:01.928955 systemd[1]: session-90.scope: Deactivated successfully. Feb 13 01:47:01.928996 systemd-logind[1543]: Session 90 logged out. Waiting for processes to exit. Feb 13 01:47:01.929500 systemd-logind[1543]: Removed session 90. Feb 13 01:47:01.844000 audit[10650]: CRED_ACQ pid=10650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:02.028117 kernel: audit: type=1101 audit(1707788821.844:1133): pid=10650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:02.028154 kernel: audit: type=1103 audit(1707788821.844:1134): pid=10650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:02.028170 kernel: audit: type=1006 audit(1707788821.844:1135): pid=10650 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=90 res=1 Feb 13 01:47:02.087095 kernel: audit: type=1300 audit(1707788821.844:1135): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd51093a0 a2=3 a3=0 items=0 ppid=1 pid=10650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:47:01.844000 audit[10650]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd51093a0 a2=3 a3=0 items=0 ppid=1 pid=10650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:47:02.087678 sshd[10643]: Failed password for root from 124.221.122.203 port 51320 ssh2 Feb 13 01:47:02.179560 kernel: audit: type=1327 audit(1707788821.844:1135): proctitle=737368643A20636F7265205B707269765D Feb 13 01:47:01.844000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:47:02.210175 kernel: audit: type=1105 audit(1707788821.850:1136): pid=10650 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:01.850000 audit[10650]: USER_START pid=10650 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:02.305144 kernel: audit: type=1103 audit(1707788821.851:1137): pid=10653 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:01.851000 audit[10653]: CRED_ACQ pid=10653 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:02.394839 kernel: audit: type=1106 audit(1707788821.925:1138): pid=10650 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:01.925000 audit[10650]: USER_END pid=10650 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:02.490858 kernel: audit: type=1104 audit(1707788821.926:1139): pid=10650 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:01.926000 audit[10650]: CRED_DISP pid=10650 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:01.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.90.7:22-139.178.68.195:60302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:03.350344 sshd[10643]: Received disconnect from 124.221.122.203 port 51320:11: Bye Bye [preauth] Feb 13 01:47:03.350344 sshd[10643]: Disconnected from authenticating user root 124.221.122.203 port 51320 [preauth] Feb 13 01:47:03.352833 systemd[1]: sshd@122-147.75.90.7:22-124.221.122.203:51320.service: Deactivated successfully. Feb 13 01:47:03.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.90.7:22-124.221.122.203:51320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:06.933585 systemd[1]: Started sshd@124-147.75.90.7:22-139.178.68.195:54960.service. Feb 13 01:47:06.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.90.7:22-139.178.68.195:54960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:06.960831 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:47:06.960902 kernel: audit: type=1130 audit(1707788826.932:1142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.90.7:22-139.178.68.195:54960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:07.078380 sshd[10678]: Accepted publickey for core from 139.178.68.195 port 54960 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:47:07.076000 audit[10678]: USER_ACCT pid=10678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.079903 sshd[10678]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:47:07.082318 systemd-logind[1543]: New session 91 of user core. Feb 13 01:47:07.082820 systemd[1]: Started session-91.scope. Feb 13 01:47:07.162391 sshd[10678]: pam_unix(sshd:session): session closed for user core Feb 13 01:47:07.163846 systemd[1]: sshd@124-147.75.90.7:22-139.178.68.195:54960.service: Deactivated successfully. Feb 13 01:47:07.164453 systemd-logind[1543]: Session 91 logged out. Waiting for processes to exit. Feb 13 01:47:07.164512 systemd[1]: session-91.scope: Deactivated successfully. Feb 13 01:47:07.164952 systemd-logind[1543]: Removed session 91. Feb 13 01:47:07.078000 audit[10678]: CRED_ACQ pid=10678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.262376 kernel: audit: type=1101 audit(1707788827.076:1143): pid=10678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.262416 kernel: audit: type=1103 audit(1707788827.078:1144): pid=10678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.262433 kernel: audit: type=1006 audit(1707788827.078:1145): pid=10678 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=91 res=1 Feb 13 01:47:07.321420 kernel: audit: type=1300 audit(1707788827.078:1145): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdde38a3a0 a2=3 a3=0 items=0 ppid=1 pid=10678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:47:07.078000 audit[10678]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdde38a3a0 a2=3 a3=0 items=0 ppid=1 pid=10678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:47:07.413960 kernel: audit: type=1327 audit(1707788827.078:1145): proctitle=737368643A20636F7265205B707269765D Feb 13 01:47:07.078000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:47:07.444605 kernel: audit: type=1105 audit(1707788827.083:1146): pid=10678 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.083000 audit[10678]: USER_START pid=10678 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.539688 kernel: audit: type=1103 audit(1707788827.084:1147): pid=10681 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.084000 audit[10681]: CRED_ACQ pid=10681 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.628902 kernel: audit: type=1106 audit(1707788827.161:1148): pid=10678 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.161000 audit[10678]: USER_END pid=10678 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.724607 kernel: audit: type=1104 audit(1707788827.161:1149): pid=10678 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.161000 audit[10678]: CRED_DISP pid=10678 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:07.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.90.7:22-139.178.68.195:54960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:08.656585 sshd[10144]: Connection closed by 124.221.203.42 port 36456 [preauth] Feb 13 01:47:08.658227 systemd[1]: sshd@107-147.75.90.7:22-124.221.203.42:36456.service: Deactivated successfully. Feb 13 01:47:08.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.90.7:22-124.221.203.42:36456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:12.170057 systemd[1]: Started sshd@125-147.75.90.7:22-139.178.68.195:54966.service. Feb 13 01:47:12.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.90.7:22-139.178.68.195:54966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:12.197416 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 01:47:12.197488 kernel: audit: type=1130 audit(1707788832.168:1152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.90.7:22-139.178.68.195:54966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:12.312000 audit[10711]: USER_ACCT pid=10711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.314049 sshd[10711]: Accepted publickey for core from 139.178.68.195 port 54966 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:47:12.315312 sshd[10711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:47:12.317609 systemd-logind[1543]: New session 92 of user core. Feb 13 01:47:12.318064 systemd[1]: Started session-92.scope. Feb 13 01:47:12.396104 sshd[10711]: pam_unix(sshd:session): session closed for user core Feb 13 01:47:12.397329 systemd[1]: sshd@125-147.75.90.7:22-139.178.68.195:54966.service: Deactivated successfully. Feb 13 01:47:12.397925 systemd-logind[1543]: Session 92 logged out. Waiting for processes to exit. Feb 13 01:47:12.397965 systemd[1]: session-92.scope: Deactivated successfully. Feb 13 01:47:12.398420 systemd-logind[1543]: Removed session 92. Feb 13 01:47:12.313000 audit[10711]: CRED_ACQ pid=10711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.496056 kernel: audit: type=1101 audit(1707788832.312:1153): pid=10711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.496094 kernel: audit: type=1103 audit(1707788832.313:1154): pid=10711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.496111 kernel: audit: type=1006 audit(1707788832.313:1155): pid=10711 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=92 res=1 Feb 13 01:47:12.554688 kernel: audit: type=1300 audit(1707788832.313:1155): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc06ae5570 a2=3 a3=0 items=0 ppid=1 pid=10711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:47:12.313000 audit[10711]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc06ae5570 a2=3 a3=0 items=0 ppid=1 pid=10711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:47:12.646753 kernel: audit: type=1327 audit(1707788832.313:1155): proctitle=737368643A20636F7265205B707269765D Feb 13 01:47:12.313000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:47:12.677210 kernel: audit: type=1105 audit(1707788832.318:1156): pid=10711 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.318000 audit[10711]: USER_START pid=10711 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.771800 kernel: audit: type=1103 audit(1707788832.319:1157): pid=10714 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.319000 audit[10714]: CRED_ACQ pid=10714 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.394000 audit[10711]: USER_END pid=10711 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.956601 kernel: audit: type=1106 audit(1707788832.394:1158): pid=10711 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.956634 kernel: audit: type=1104 audit(1707788832.395:1159): pid=10711 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.395000 audit[10711]: CRED_DISP pid=10711 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:12.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.90.7:22-139.178.68.195:54966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:17.402111 systemd[1]: Started sshd@126-147.75.90.7:22-139.178.68.195:60288.service. Feb 13 01:47:17.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.90.7:22-139.178.68.195:60288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:17.428955 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:47:17.429040 kernel: audit: type=1130 audit(1707788837.400:1161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.90.7:22-139.178.68.195:60288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:17.542000 audit[10737]: USER_ACCT pid=10737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:17.544658 sshd[10737]: Accepted publickey for core from 139.178.68.195 port 60288 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:47:17.547773 sshd[10737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:47:17.550220 systemd-logind[1543]: New session 93 of user core. Feb 13 01:47:17.550775 systemd[1]: Started session-93.scope. Feb 13 01:47:17.632270 sshd[10737]: pam_unix(sshd:session): session closed for user core Feb 13 01:47:17.633778 systemd[1]: sshd@126-147.75.90.7:22-139.178.68.195:60288.service: Deactivated successfully. Feb 13 01:47:17.634443 systemd-logind[1543]: Session 93 logged out. Waiting for processes to exit. Feb 13 01:47:17.634479 systemd[1]: session-93.scope: Deactivated successfully. Feb 13 01:47:17.634958 systemd-logind[1543]: Removed session 93. Feb 13 01:47:17.545000 audit[10737]: CRED_ACQ pid=10737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:17.728904 kernel: audit: type=1101 audit(1707788837.542:1162): pid=10737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:17.728942 kernel: audit: type=1103 audit(1707788837.545:1163): pid=10737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:17.728959 kernel: audit: type=1006 audit(1707788837.545:1164): pid=10737 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=93 res=1 Feb 13 01:47:17.787518 kernel: audit: type=1300 audit(1707788837.545:1164): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde8fe9ab0 a2=3 a3=0 items=0 ppid=1 pid=10737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:47:17.545000 audit[10737]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde8fe9ab0 a2=3 a3=0 items=0 ppid=1 pid=10737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:47:17.879603 kernel: audit: type=1327 audit(1707788837.545:1164): proctitle=737368643A20636F7265205B707269765D Feb 13 01:47:17.545000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:47:17.910057 kernel: audit: type=1105 audit(1707788837.551:1165): pid=10737 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:17.551000 audit[10737]: USER_START pid=10737 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:18.004514 kernel: audit: type=1103 audit(1707788837.552:1166): pid=10740 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:17.552000 audit[10740]: CRED_ACQ pid=10740 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:18.093674 kernel: audit: type=1106 audit(1707788837.631:1167): pid=10737 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:17.631000 audit[10737]: USER_END pid=10737 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:18.189197 kernel: audit: type=1104 audit(1707788837.631:1168): pid=10737 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:17.631000 audit[10737]: CRED_DISP pid=10737 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:17.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.90.7:22-139.178.68.195:60288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:22.635582 systemd[1]: Started sshd@127-147.75.90.7:22-139.178.68.195:60300.service. Feb 13 01:47:22.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.90.7:22-139.178.68.195:60300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:22.662636 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 01:47:22.662723 kernel: audit: type=1130 audit(1707788842.635:1170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.90.7:22-139.178.68.195:60300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:22.778000 audit[10804]: USER_ACCT pid=10804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:22.779588 sshd[10804]: Accepted publickey for core from 139.178.68.195 port 60300 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 01:47:22.780866 sshd[10804]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 01:47:22.783146 systemd-logind[1543]: New session 94 of user core. Feb 13 01:47:22.783813 systemd[1]: Started session-94.scope. Feb 13 01:47:22.859383 sshd[10804]: pam_unix(sshd:session): session closed for user core Feb 13 01:47:22.860652 systemd[1]: sshd@127-147.75.90.7:22-139.178.68.195:60300.service: Deactivated successfully. Feb 13 01:47:22.861240 systemd-logind[1543]: Session 94 logged out. Waiting for processes to exit. Feb 13 01:47:22.861300 systemd[1]: session-94.scope: Deactivated successfully. Feb 13 01:47:22.861717 systemd-logind[1543]: Removed session 94. Feb 13 01:47:22.780000 audit[10804]: CRED_ACQ pid=10804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:22.871687 kernel: audit: type=1101 audit(1707788842.778:1171): pid=10804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:22.871721 kernel: audit: type=1103 audit(1707788842.780:1172): pid=10804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:23.020330 kernel: audit: type=1006 audit(1707788842.780:1173): pid=10804 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=94 res=1 Feb 13 01:47:23.020362 kernel: audit: type=1300 audit(1707788842.780:1173): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec2662a70 a2=3 a3=0 items=0 ppid=1 pid=10804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:47:22.780000 audit[10804]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec2662a70 a2=3 a3=0 items=0 ppid=1 pid=10804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 01:47:23.112355 kernel: audit: type=1327 audit(1707788842.780:1173): proctitle=737368643A20636F7265205B707269765D Feb 13 01:47:22.780000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 01:47:23.142826 kernel: audit: type=1105 audit(1707788842.785:1174): pid=10804 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:22.785000 audit[10804]: USER_START pid=10804 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:23.237305 kernel: audit: type=1103 audit(1707788842.785:1175): pid=10807 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:22.785000 audit[10807]: CRED_ACQ pid=10807 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:23.295946 systemd[1]: Started sshd@128-147.75.90.7:22-124.221.203.42:51420.service. Feb 13 01:47:23.326535 kernel: audit: type=1106 audit(1707788842.859:1176): pid=10804 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:22.859000 audit[10804]: USER_END pid=10804 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:23.422001 kernel: audit: type=1104 audit(1707788842.859:1177): pid=10804 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:22.859000 audit[10804]: CRED_DISP pid=10804 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 01:47:22.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.90.7:22-139.178.68.195:60300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:23.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.90.7:22-124.221.203.42:51420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:24.139357 sshd[10831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.221.203.42 user=root Feb 13 01:47:24.139000 audit[10831]: USER_AUTH pid=10831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.221.203.42 addr=124.221.203.42 terminal=ssh res=failed'